THE BALBIX BLOG

Musings on predictive cyber risk and resilience.

 

The 3 Reasons CVSS Scores Change Over Time

CVSS Scores are numeric representations of the severity of a vulnerability. CVSS scores are composed of three sub metric...

6 Challenges New CISOs Face in Assessing Breach Risk

Week 2 at the new gig as CISO of the hot company you've had your eye on for quite some time. No immediate red flags yet....

The Top 10 Routinely Exploited Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) recently published...

5 Reasons to Stop Using CVSS Scores to Measure Risk

When a new software vulnerability is reported, the infosec team's first job is to determine the risk that the vulnerability...

Improving Your Security Posture in 3 Easy Steps

Security posture, which is the aggregate security status of all assets in your organization, has an inverse relationship...

Where to Start With IT Consolidation?

There's little doubt that cost cutting and consolidation will be hot topics for the foreseeable future. For the past decade,...

Maze Ransomware: Are You Vulnerable?

Yet another high profile ransomware outbreak. This time, the victim is $17Bn Fortune 500 consulting giant, Cognizant. The...

The Lean, Mean Vulnerability Management Machine

Pop quiz: What's the goal of your vulnerability management (VM) program?

Leading an Economical and Efficient InfoSec Program

As the world begins to recover over the next several months, one thing is certain. Recent events will have taken a toll on...

Don't Be Misled by CVSS Scores

CVSS scores are widely relied upon by enterprises to gauge how important it is to prioritize a vulnerability. CVSS scores...