Category Archives: Vulnerability Management

Validating Vulnerabilities with Metasploit

Ed Bellis    September 13, 2012

We recently added the ability to track publicly available exploits for any vulnerabilities discovered in your environment, regardless of how they were discovered. We viewed this as a step in the right direction and one of many factors that go into prioritizing remediation efforts. Our friend Mike Rothman over at Securosis took notice of this, both acknowledging the need while… Read more »

Hitting Above the Security Mendoza Line

Ed Bellis    August 14, 2012

Risk I/O can now be used to identify publicly available exploits to your existing vulnerabilities. Our development team has made it possible for Risk I/O to match attack vectors from databases of quality assured exploits, such as Metasploit and ExploitDB, to applicable vulnerabilities. This information, paired with vulnerability data from assessment tools, allows you to understand how your organization is… Read more »

Another Week, Another Integration: Retina meet Risk I/O

Andrea Bailiff-Gush    May 30, 2012

We’re beginning to sound a bit like a broken record, but yes, this week we launched another out-of-the-box integration with Risk I/O. Our goal has always been to build a complete vulnerability management platform that works with the tools you’re already using. That’s why we’ve added eEye Digital Security’s Retina Network Security Scanner to our arsenal of integrations. As a connector, you can… Read more »

Now Serving Veracode Users

Andrea Bailiff-Gush    May 15, 2012

Following our recent integration with Portswigger’s Burp web scanner, our development team has added another vulnerability assessment tool to Risk I/O. Integration with Veracode static analysis is now available! If you use Veracode to scan your applications for security flaws, you’ll be happy to learn that you can now plug it into Risk I/O to manage and monitor the vulnerabilities that… Read more »

Our Latest Integration

Ed Bellis    March 26, 2012

Hot on the heels of launching role-based access control which allows you to control who has access to what in Risk I/O (all the way down to the vulnerability level), we have added integration with a new vulnerability assessment tool. (Drum roll please…) We are happy to announce that integration with the Burp Scanner is now available in Risk I/O! For… Read more »

No More Traffic Signals

Ed Bellis    March 23, 2012

Red, Yellow, Ugh… I have been frustrated by the state of prioritization in security for several years. I recently wrote about how a data-driven approach can help prioritize remediation when there are a large amount of issues to contend with. It seems that much of the industry got together years ago and decided we could drop millions of issues into… Read more »

Special Orders Don’t Upset Us

Ed Bellis    January 18, 2012

Just a quick post to give you an update on one of our newest features. A few months back we wrote about custom fields in Risk I/O and how to add your own data and metadata to your vulnerabilities and assets. Today I’m writing about taking this customization to the next step. We recognize different people within your company are… Read more »

The Scanner That Cried Wolf

Ed Bellis    January 5, 2012

Dealing with false positives during a vulnerability assessment is a fact of life. As applications and infrastructure grow larger and more complex, the likelihood of running into these Type I errors increases along with it. Although these issues become more commonplace as you grow, there are a number of known ways to help decrease the amount of false positives that are produced… Read more »