THE BALBIX BLOG

Musings on predictive cyber risk and resilience.

 

5 reasons why you should work at Balbix (and 3 reasons why you should not ….)

 

So you have been thinking about your next career move and the thought of building, selling (or supporting/implementing)...

Quantifying cyber-risk for your BoD and c-suite colleagues

How should you report on your organization's cybersecurity posture to your board of directors and C-suite colleagues?

Context: Your Super-Weapon in Vulnerability Management?

Merriam Webster defines context as the interrelated conditions in which something exists or occurssuch as the environment...

Why Modern Enterprises Require Risk-Based Vulnerability Management

Cyberattacks are an increasing concern for organizations in every sector. Complicating the matter is the level of...

Announcing our Series B Funding!

We have some fantastic news to share today — we’ve raised $20 million in our Series B round! Singtel Innov8, the corporate...

What is an iSOC?

Earlier today Tech Mahindra (TechM), a leading global provider of consulting services and solutions announced a strategic...

Part 3: Beyond the Hype: AI, ML, and Deep Learning in Cybersecurity

This is the final piece of my three part blog on the topic of human intelligence vs AI, and how AI is being used...

Part 2: Beyond the Hype: AI, ML, and Deep Learning in Cybersecurity 

This is the second piece of my three part blog on the topic of the nature of human intelligence vs AI, understanding the...

Beyond the Hype: AI, ML, and Deep Learning in Cybersecurity

Recently, I participated in a thought leadership discussion moderated by Izak Mutlu, former CISO of Salesforce, and Gamiel...

The Deloitte Breach: Any New Takeaways?

Another breach, this time of a top cyber-advisory firm, Deloitte. So the Equifax breach was about the company’s culture, and...