This is the third post in a three-part series on Agile Risk Intelligence. The complete Agile Risk Intelligence e-book is now available. With vulnerability scanners deployed across the stack and the organization, security managers are swimming in data, but struggling to make sense of it. As I blogged about previously, current approaches lack the context and global visibility to deliver meaningful insight…. Read more »
This is the second post in a three-part series on Agile Risk Intelligence. The complete Agile Risk Intelligence e-book is now available. The thump from the far corner of the house reaches a mother’s ears. Before she is even aware of it, her subconscious begins to instinctively collect, correlate and process additional information. Honed by millions of years of evolution and fine tuned… Read more »
This is the first post in a three-part series on Agile Risk Intelligence. The complete Agile Risk Intelligence e-book is now available. Security executives have always embraced the challenging task of protecting the organizations’ users and assets. It’s a thankless job against a faceless enemy, but that’s always been part of the deal. However, today it seems like the objective… Read more »
The third annual BayThreat conference was held this past weekend (Dec 7th and Dec 8th) in Sunnyvale, CA. Ryan Huber and myself from Risk I/O attended the event. BayThreat is a security conference that has a great community feel. This year’s event outgrew its previous location, and was held at the festive Firehouse Brewery in the historic section of Sunnyvale. Baythreat’s 2012… Read more »
Organizations face a number of issues as part of their vulnerability management programs, not the least of which is data management. The problems security teams face managing and remediating their security defects has evolved over the past several years. Finding vulnerabilities is no longer the challenge. Mature security teams are looking at all of their assets layers including their applications, databases,… Read more »
Thanks to our customers and beta users great feedback, we have been rolling out new features to Conduit at a furious pace. We’ll be posting another blog entry with more details including a new product walkthrough screencast, but we thought we’d expose a few quick highlights here. A complete redesign of the interface We have given our user interface a… Read more »
A quick note to let you know we now have a short video on some of the features within HoneyApps Conduit. In an effort to keep it short and sweet, it’s not a full product tour but a quick overview to give you a feel for what we’re building here. We’ve embedded the video below. If you want to talk… Read more »
Starting us off with an obligatory post to welcome you to our new blog. We hope to begin posting regularly here about the topics we know best; mainly vulnerability management, info security, metrics and automation! Check in with us soon to see how we are doing. In the meantime, take a test drive of our Conduit beta.