Author Archives: admin

Five Architectural Requirements for an Agile Vulnerability Intelligence Platform

admin    January 24, 2013

This is the third post in a three-part series on Agile Risk Intelligence. The complete Agile Risk Intelligence e-book is now available. With vulnerability scanners deployed across the stack and the organization, security managers are swimming in data, but struggling to make sense of it. As I blogged about previously, current approaches lack the context and global visibility to deliver meaningful insight…. Read more »

Instinct to Insight: Five Gaps in Agile Risk Responsiveness

admin    January 17, 2013

This is the second post in a three-part series on Agile Risk Intelligence. The complete Agile Risk Intelligence e-book is now available. The thump from the far corner of the house reaches a mother’s ears. Before she is even aware of it, her subconscious begins to instinctively collect, correlate and process additional information.  Honed by millions of years of evolution and fine tuned… Read more »

The Case for Agile Risk Intelligence

admin    January 10, 2013

This is the first post in a three-part series on Agile Risk Intelligence. The complete Agile Risk Intelligence e-book is now available. Security executives have always embraced the challenging task of protecting the organizations’ users and assets. It’s a thankless job against a faceless enemy, but that’s always been part of the deal. However, today it seems like the objective… Read more »

BayThreat 2012

admin    December 11, 2012

The third annual BayThreat conference was held this past weekend (Dec 7th and Dec 8th) in Sunnyvale, CA. Ryan Huber and myself from Risk I/O attended the event.  BayThreat is a security conference that has a great community feel.  This year’s event outgrew its previous location, and was held at the festive Firehouse Brewery in the historic section of Sunnyvale. Baythreat’s 2012… Read more »

Vulnerability Management As A Data Issue

admin    April 19, 2010

Organizations face a number of issues as part of their vulnerability management programs, not the least of which is data management. The problems security teams face managing and remediating their security defects has evolved over the past several years. Finding vulnerabilities is no longer the challenge. Mature security teams are looking at all of their assets layers including their applications, databases,… Read more »

Features Rolling Fast & Furious

admin    April 13, 2010

Thanks to our customers and beta users great feedback, we have been rolling out new features to Conduit at a furious pace. We’ll be posting another blog entry with more details including a new product walkthrough screencast, but we thought we’d expose a few quick highlights here. A complete redesign of the interface We have given our user interface a… Read more »

Feature Tour Now Online

admin    April 13, 2010

A quick note to let you know we now have a short video on some of the features within HoneyApps Conduit. In an effort to keep it short and sweet, it’s not a full product tour but a quick overview to give you a feel for what we’re building here. We’ve embedded the video below. If you want to talk… Read more »

Hello world!

admin    March 5, 2010

Starting us off with an obligatory post to welcome you to our new blog. We hope to begin posting regularly here about the topics we know best; mainly vulnerability management, info security, metrics and automation! Check in with us soon to see how we are doing. In the meantime, take a test drive of our Conduit beta.