Security Policy Management

15 06, 2017

EU GDPR is Coming: Are you prepared?

By |2017-10-03T15:51:00-07:00June 15th, 2017|Compliance|

On May 25, 2018, any organization that handles European Union residents’ data must have established processes and procedures compliant with the General Data Protection Regulation (GDPR). Businesses are obligated to implement technical and organizational measures to show data protection has been woven into all their data processing activities. Why should you care about EU GDPR? [...]

27 08, 2015

FTC to Protect Customer Data and Extend Regulations to Cyber Security

By |2017-11-13T16:09:12-07:00August 27th, 2015|Compliance|

On August 24, the US Court of Appeals for the Third Circuit upheld a lower court ruling granting the Federal Trade Commission the power to regulate cyber security in businesses. The case surrounded a lawsuit brought against Wyndham Hotels by the FTC for failing to protect its customers’ financial data. The court’s decision is good [...]

13 07, 2015

Access Analyzer: The who, what, and why of access path analysis

By |2017-11-13T15:49:33-07:00July 13th, 2015|Security Policy Management, Vulnerability & Threat Management|

Network security engineers have to understand who has access to what on their network, and why. In enterprise-scale networks, such path analysis can be a huge challenge. Simple tools like Traceroute are often used, but it has its own operational issues—namely, you have to be on the same machine you’re analyzing. This asset-centric method of [...]

30 06, 2015

The Super Model of Network Visibility & Intelligence

By |2017-11-14T11:38:03-07:00June 30th, 2015|Security Policy Management, Vulnerability & Threat Management|

Move over Gisele. Network models are more than just something to look at—they’re smart too. Interactive models not only provide total network visibility, but create an environment for intelligence you can test and act on quickly. The Big Break-Up Point solutions can be a major obstacle to network security by creating a disconnected environment. Silos [...]

20 02, 2015

Network Mapping vs. Network Modeling: Apples vs. Contextually-Aware Oranges

By |2017-11-14T13:36:12-07:00February 20th, 2015|Visibility & Intelligence|

One of the unique features of Skybox, and the basis for what we do, is our network model. A network model is often confused with a network map. A network map is a two-dimensional representation of the network. The difference between a model and a map comes down to how well it emulates and represents the network. [...]

17 02, 2015

Reducing Your Attack Surface: Think like a Hospital

By |2017-11-14T11:26:43-07:00February 17th, 2015|Security Policy Management, Vulnerability & Threat Management|

The Anthem data breach with the growing list of others—Sony, Target, and more—continues to highlight the gravity of reducing your attack surface. Enterprise networks are under constant threat, and automated, consistent security management processes are needed to shrink your attack vectors, and detect and respond to attacks. You manage an enterprise network in the era [...]