Category Archives: Vulnerability Intelligence

Crowdsourcing Vulnerability Intelligence

guest blogger    December 6, 2012

This is the first post in our guest blogging series. If you are interested in writing for Risk I/O, visit our Guest Blogging page for more information. Strictly speaking, crowdsourcing refers to a model for problem solving that depends on turning requests for information, service, or even ideas over to an unknown but reachable group of potential participants to seek… Read more »

Achievement Unlocked: Venture Funding

Ed Bellis    November 13, 2012

Today we’re really excited to announce our latest round of funding and welcome our newest investors to the Risk I/O team. Our new investors include U.S. Venture Partners and Costanoa Venture Capital and I am thrilled to be working directly with Jacques Benkoski, our newest board member, as well as Greg Sands. We also had great participation and validation from our existing investors… Read more »

No More Traffic Signals

Ed Bellis    March 23, 2012

Red, Yellow, Ugh… I have been frustrated by the state of prioritization in security for several years. I recently wrote about how a data-driven approach can help prioritize remediation when there are a large amount of issues to contend with. It seems that much of the industry got together years ago and decided we could drop millions of issues into… Read more »

The Vulnerability Arms Race

Ed Bellis    May 13, 2011

Note: This is a repost from my CSO Online blog. If you are working in an organization with any sizable technology infrastructure, it has probably become quite apparent that your vulnerability management program has a lot more “vulnerabilities” than “management”. I recently had an email exchange with Gene Kim, CTO at Tripwire, regarding this issue and he boiled it down… Read more »

Our Need For Security Intelligence

Ed Bellis    May 3, 2011

Note: This post is an archive and was originally posted on CSO Online. I will be posting a follow up to this with additional ways to use data and intelligence tools to help make security decisions. No I am not speaking of military intelligence, but rather, business intelligence within a security context. Business intelligence and decision support systems have now… Read more »

Vulnerability Management As A Data Issue

admin    April 19, 2010

Organizations face a number of issues as part of their vulnerability management programs, not the least of which is data management. The problems security teams face managing and remediating their security defects has evolved over the past several years. Finding vulnerabilities is no longer the challenge. Mature security teams are looking at all of their assets layers including their applications, databases,… Read more »