Skip to content
Contact Sales

Kim Maibaum

Senior Product Marketing Manager Skybox Security

Kim is an experienced B2B marketing professional who has built a career helping organizations bring sophisticated technical solutions to market. With nearly a decade in cybersecurity, she has a passion for translating complex concepts into conversations that resonate with the audience.

Articles by Kim Maibaum

November 12, 2024
Why attack surface management is critical for organizations in 2025

As the attack surface continues to grow, organizations need network visibility to stay secure. Learn why it’s time to embrace Attack Surface Management.

November 7, 2024
Ready, set, automate: How firewall automation revolutionizes firewall change management

Firewall management is overwhelming. Learn how one organization uses automation to reduce its risk and workload.

October 30, 2024
Fears and Frights: Unmasking the scary truth about vulnerability management

Effective vulnerability prioritization requires a comprehensive approach. Here are five reasons to consider a threat-centric vulnerability management program.

October 1, 2024
Four tips for Cybersecurity Awareness Month to keep your organization better protected

Every October, CISA reminds everyone to focus on cybersecurity. Learn how they recommend you stay safe this year.

September 19, 2024
From Silos to Synergy: Transforming Network and Security Operations

Effective communication between network and security teams reduces risk. See why organizations want to break down exposure management silos to improve security.

September 4, 2024
Six Tips to Improve Your OT Network Security

Vulnerabilities for utility organizations are proliferating at an unprecedented rate. Learn how to better protect your OT or air gapped networks.

August 22, 2024
How to Build a Context Aware Network Security Policy

Fragmented networks, blind network security policy changes, and lack of change validation increase risk. Context-aware network security policies can help.

August 15, 2024
Designed to Protect: What is Security Policy Management (SPM)?

The complexities of today’s hybrid environments are hard to manage. Having a strong security policy helps minimize risk and better protect the organization.

July 24, 2024
Automate firewall change management to boost efficiency and combat modern threats

Leverage automation to combat skill shortages, streamline tasks, simplify network security policy compliance, and identify vulnerability exposures

July 10, 2024
Network modeling: Why visibility is the key to securing your networks

A dynamic network security model helps you see gaps or potential risks and make informed, proactive security decisions. See why visibility is key to security.

June 26, 2024
2024 Vulnerability and Threats Trends Report highlights the escalating battle security teams face

The trend is clear – security teams are inundated with vulnerabilities. Without prioritization and full visibility, it’s hard to understand your highest risks.

June 26, 2024
The timeline of cybersecurity: Why organizations need to find better ways to mitigate risk

Today’s cybercriminals are quick to exploit new vulnerabilities. To stay protected, security teams need a more proactive approach to vulnerability management.

April 10, 2024
Achieve continuous network and security compliance to alleviate audit pressure

Network and security compliance is critical for many organizations. Learn how continuous compliance helps reduce cybersecurity risks and the high cost associated non-compliance.

April 2, 2024
Six steps to optimize firewalls to improve cyber hygiene and reduce risk

Learn how to analyze firewall rule sets and automate change management workflows to improve cyber hygiene, ensure compliance, and reduce risk.

February 22, 2024
Going beyond the scan: What is vulnerability and threat management?

In today’s complex threat environment, organizations need continuous network visibility to reduce risk. Learn how vulnerability and threat management can help.

February 8, 2024
What is External Attack Surface Management (EASM)?

External-facing digital assets are key targets for cybercriminals. See how External Attack Surface Management (EASM) solutions can help you stay protected.

January 3, 2024
Three tips to achieve team-harmony with integrated network and security solutions

Cybersecurity is critical to every organization, but team silos can get in the way. Learn three ways to achieve harmony between network & security teams.