Skip to content

Cybersecurity resources for energy and utilities

Address nation-state threat actors targeting critical infrastructure through exposure-based vulnerability prioritization and complete visibility across your IT and OT networks.

Operational technology cybersecurity risk significantly underestimated

OT faces uphill battle comprised of network complexity, functional silos, supply chain risk, and limited vulnerability remediation options

Functional silos create dysfunctional OT security

Skybox CRO Rob Rosiello discusses new research in which CISOs, Architects, and Engineers say their top challenge in securing...

Three ways to modernize your OT security programs

Research reveals OT vulnerabilities increased by 46%, necessitating a new approach to OT security.

Biden’s cybersecurity executive order calls for an expanded scope

While Biden’s cybersecurity executive order is a good first step, the U.S federal government needs to adopt a new...

Build a robust IT/OT security approach

Unlock complete attack surface visibility, analytics, and automation across your IT, OT, and hybrid cloud environments with a security...

Skybox solution for operational technology security

Industrial strength security for an industrial world; get comprehensive security posture management tools to centralize, automate and connect IT...

Vulnerability and threat trends mid-year report 2021

Critical infrastructure emerges as a top concern among the dizzying rate of vulnerability growth during the first half of...

Cyberattacks increase across an expanding attack surface

Key findings from the 2021 vulnerability and threat trends mid-year report.

Skybox Vulnerability and Threat Trends Mid-Year Report 2021 reveals emerging security challenges and growing need for exposure analysis

Skybox’s recently published Mid-Year Vulnerability and Threat Trends Report 2021 found increased activity of cybercrime.

Vulnerability and Threat Trends Report highlights the importance of cyber exposure analysis that goes beyond CVSS rating

If your network security firewalls are breached and data stolen, it might have been those shady characters hanging out...

Cryptomining is hottest new malware type, research reveals

Skybox Research Lab discovers cryptomining is the fastest-growing malware category, signaling trouble ahead for enterprises.

Vulnerability and threat trends report 2021

The rapid change experienced in 2020 has illuminated a simple truth: What used to work for enterprise security is...

The business of cybercrime: malware-as-a-service gains pace

Gain a deep understanding of the current threat landscape, including insight into how the malware cybercrime industry is likely...

What will President Biden’s Executive Order on improving the nation’s cybersecurity accomplish?

A proactive security posture strategy is needed.

Hidden in plain sight: There is no such thing as a low-risk vulnerability

Bad actors succeed whenever enterprises lack understanding of which vulnerabilities to prioritize for remediation and why.

Post-pandemic cyber threats

As we move into a post-Covid world, there are sure to be new cyber threats.

Could the “ex-factor” limit the blast radius and reduce the impact of the SolarWinds breach?

Security leaders have long wanted to tackle their most pervasive issues. These include exponential growth of the attack surface...

Oil and gas companies accelerate vulnerability remediation from weeks to hours

Discover how a service provider developed firewall change management best practices to reduce firewall management costs and strengthen overall...

De-risk IT/OT convergence

Avoid unplanned downtime with intelligent OT security. Unlock complete attack surface visibility, analytics, and automation across your IT network,...

You have problems? We have solutions.

Let’s talk

Would you like to learn more about Skybox products and services or explore which use cases best suit your needs?

Get started

Share your use case, and we’ll take you on a customized, guided demonstration to show how Skybox can help.