Security Policy Management

9 04, 2020

How will COVID-19 Impact Digital Transformation?

By |2020-04-09T10:06:45-07:00April 9th, 2020|Threat Intelligence, Visibility & Intelligence|

We’re all still feeling the fallout from the onset of the COVID-19 crisis: it has impacted the way we live, the way we work and will have hindered some business’ new business initiatives, including a number of large-scale digital transformation efforts. The impact of the shift which businesses have been forced to take as a [...]

27 03, 2020

How Network Visibility and Context Simplifies Cybersecurity Management

By |2020-04-14T09:47:32-07:00March 27th, 2020|Virtual and Cloud Network Security, Visibility & Intelligence|

There’s a common thread that connects most organizations that suffer breaches: they lack total network visibility. Large, enterprise estates are comprised of several disparate network elements, including on-premise, OT, cloud and virtual networks. These hybrid environments are rife with process disconnect and have a number of dangerous blind spots. Without full network visibility, security teams [...]

1 10, 2019

Network Mapping vs. Network Modeling: Apples vs. Contextually-Aware Oranges

By |2019-10-01T17:27:58-07:00October 1st, 2019|Visibility & Intelligence|

One of the unique features of Skybox, and the basis for what we do, is our network model. A network model is often confused with a network map. A network map is a two-dimensional representation of the network. The difference between a model and a map comes down to how well it emulates and represents the network. [...]

15 06, 2017

EU GDPR is Coming: Are you prepared?

By |2017-10-03T15:51:00-07:00June 15th, 2017|Compliance|

On May 25, 2018, any organization that handles European Union residents’ data must have established processes and procedures compliant with the General Data Protection Regulation (GDPR). Businesses are obligated to implement technical and organizational measures to show data protection has been woven into all their data processing activities. Why should you care about EU GDPR? [...]

27 08, 2015

FTC to Protect Customer Data and Extend Regulations to Cyber Security

By |2017-11-13T16:09:12-08:00August 27th, 2015|Compliance|

On August 24, the US Court of Appeals for the Third Circuit upheld a lower court ruling granting the Federal Trade Commission the power to regulate cyber security in businesses. The case surrounded a lawsuit brought against Wyndham Hotels by the FTC for failing to protect its customers’ financial data. The court’s decision is good [...]

13 07, 2015

Access Analyzer: The who, what, and why of access path analysis

By |2017-11-13T15:49:33-08:00July 13th, 2015|Security Policy Management, Vulnerability & Threat Management|

Network security engineers have to understand who has access to what on their network, and why. In enterprise-scale networks, such path analysis can be a huge challenge. Simple tools like Traceroute are often used, but it has its own operational issues—namely, you have to be on the same machine you’re analyzing. This asset-centric method of [...]

30 06, 2015

The Super Model of Network Visibility & Intelligence

By |2017-11-14T11:38:03-08:00June 30th, 2015|Security Policy Management, Vulnerability & Threat Management|

Move over Gisele. Network models are more than just something to look at—they’re smart too. Interactive models not only provide total network visibility, but create an environment for intelligence you can test and act on quickly. The Big Break-Up Point solutions can be a major obstacle to network security by creating a disconnected environment. Silos [...]