The Skybox View

202, 2017

Throwback Thursday: Life After Breach

By |February 2nd, 2017|Cybersecurity|Comments Off on Throwback Thursday: Life After Breach

Shamoon is back in the Middle East, but what lessons were learned from it's last attack? Here's 5 steps to recover from a data breach learned the hard way after the 2012 attack on Aramco.


2501, 2017

Shamoon 2 Distributing DistTrack Wiper in Saudi Arabia

By |January 25th, 2017|Energy, Oil & Gas|Comments Off on Shamoon 2 Distributing DistTrack Wiper in Saudi Arabia

Petrochemical Company Sadara has reportedly already been affected by the advanced, multi-step attack. Learn how Skybox can help.


2301, 2017

5 Security Management Trends to Watch in 2017

By |January 23rd, 2017|Cybersecurity|Comments Off on 5 Security Management Trends to Watch in 2017

Cybersecurity can’t sit still. As we look ahead to what this year has in store for the security management landscape, organizations globally should be paying attention to five key trends.


1612, 2016

Confronting the High-Stakes Demand for Cybersecurity Talent

By |December 16th, 2016|Critical Infrastructure, Energy, Oil & Gas|Comments Off on Confronting the High-Stakes Demand for Cybersecurity Talent

A four-part framework for critical infrastructure organizations looking to overcome the skills gap and create a strong cybersecurity workforce


512, 2016

Currency Ban Could Increase Risk of Cyberthreats for Indian Banks

By |December 5th, 2016|Attack Surface|Comments Off on Currency Ban Could Increase Risk of Cyberthreats for Indian Banks

As Indian banks cope with the increased volumes of electronic transactions, cybercriminals may use the chaos to their benefit, potentially putting banks at increased risk of cyberattacks.


2111, 2016

Track, Measure and Report Cybersecurity Risk Reduction

By |November 21st, 2016|Product Info|Comments Off on Track, Measure and Report Cybersecurity Risk Reduction

New visual dashboards in Skybox Horizon show attack surface history and trend data to understand impact of risk-fighting efforts


1411, 2016

Bridging the Gap Between IT and OT Network Security

By |November 14th, 2016|Critical Infrastructure|Comments Off on Bridging the Gap Between IT and OT Network Security

Modeling, access simulation and vulnerability analysis capabilities bring enhanced visibility to SCADA and ICS networks to maintain uptime and avoid disruption while unifying IT and OT security processes


3110, 2016

Businesses Putting Money Where Its Cybersecurity Is

By |October 31st, 2016|Cybersecurity|Comments Off on Businesses Putting Money Where Its Cybersecurity Is

National Cybersecurity Awareness Month is pushing for employees from the break room to the board room help keep their organization secure. See how and why the C-suite is committing like never before.


1910, 2016

Game of Thrones: Exploit Kit Edition

By |October 19th, 2016|Cybersecurity|Comments Off on Game of Thrones: Exploit Kit Edition

Angler, Nuclear and Neutrino are dead – long live RIG!


1410, 2016

Security Through Visibility: Seeing Into Virtual and Cloud Networks

By |October 14th, 2016|Virtual and Cloud Network Security|Comments Off on Security Through Visibility: Seeing Into Virtual and Cloud Networks

Read the article by Skybox VP of Products to learn how model-driven visibility can help network security teams unify policies, verify access and discover vulnerabilities across hybrid IT environments.