Tag Archives: HD Moores Law

Hitting Above the Security Mendoza Line

Ed Bellis    August 14, 2012

Risk I/O can now be used to identify publicly available exploits to your existing vulnerabilities. Our development team has made it possible for Risk I/O to match attack vectors from databases of quality assured exploits, such as Metasploit and ExploitDB, to applicable vulnerabilities. This information, paired with vulnerability data from assessment tools, allows you to understand how your organization is… Read more »

Same As It Ever Was

Ed Bellis    November 21, 2011

A couple of weeks ago I was invited by IANS to participate in a panel presentation in one of their Executive Client Briefings. The theme for the event was on building risk-based management frameworks and I headed up the Next Generation Threat Management portion. First off, many thanks to the folks at IANS for having me, as usual they did… Read more »