1 02, 2012
The Securities and Exchange Commission (SEC) released a guidance document that strongly suggests companies pay more attention to "assessing the impact of cyber security attacks and its outcome; especially as it relates to weaknesses in the security posture and preventive measures of the organization."
1 11, 2011
Using an automated tool like Risk Control to prioritize vulnerabilities according to real network topology and risk factors helps you predict the most damaging ‘moles’ in advance and retire them before they are exploited by an attacker.
11 10, 2011
Check out these basic best practices that, if followed in a timely manner, can reduce the number and potential severity of security gaps that could be exploited.
9 09, 2011
Perpetrators of APTs are patient and well -- persistent. If there is a security gap (and whose network doesn’t have one) they will find it. But before you lose hope, there are steps you can take to significantly lower the risk of attack or focus your limited IT security resources to shine a spotlight on suspicious activities.
16 08, 2011
There are two vital elements and a mindset that security professionals should consider when protecting their organization from APTs: Proactive Risk Reduction, and Automation.
2 05, 2011
Modern network access and visibility systems, like Skybox Network Assurance, can do this for your network. They capture network topology and traffic rules by reading firewall and router configurations. The routers and other devices know what devices surround them so the network links can be deduced automatically to generate a network map.
15 03, 2011
Skybox conducted a survey at RSA and found some disturbing information around firewall management – and how many organizations continue to manage firewalls manually.
28 02, 2011
Illena Armstrong, the Editor-in-Chief of SC Magazine, took some time to interview Michelle Johnson Cobb, VP of Product and Worldwide Marketing at Skybox Security, on the floor of RSA this year.
18 02, 2011
“Next Generation” was probably the most popular term at the RSA conference this week. Many vendors announced or re-announced their solutions and reclassified them as “Next Generation” security solutions for a variety of emerging IT technologies and trends such as mobile computing, cloud architectures, virtualization, application and user aware firewalls, etc.
17 02, 2011
Here are a couple of approaches to automate your security tasks.