Tag Archives: industry

What a Difference a Year Makes: Reflecting on our Dell SecureWorks Partnership

Ryan Cunnane    February 18, 2015

What a different a year makes. Nearly a year ago, Risk I/O was in the beginning phases of what would become one of our greatest successes to date: a partnership with Dell SecureWorks.  As we celebrate the one-year anniversary of the partnership, we wanted to highlight its significance and firm validation in the marketplace. Partnership highlights include: Threat intelligence supplied by Dell SecureWorks’… Read more »

The Security Circus Comes to Las Vegas

rhuber    July 18, 2013

The end of July will see thousands of security professionals descend on Las Vegas for another round of instruction, information, networking, sales, parties and FUD. This will be the 13th consecutive year I’ve attended at least one of BlackHat, BSides or Defcon events. It is easy to become overwhelmed with so much going on, so here are a few tips for… Read more »

Register for the Risk I/O Webinar!

Andrea Bailiff-Gush    February 19, 2013

Risk I/O would like to invite you to see our vulnerability intelligence tool in action on Friday, February 22 at 11:00AM PT/ 2:00PM ET. Led by Risk I/O CEO, Ed Bellis, this webinar will provide an overview and demo of Risk I/O. Learn how with Risk I/O you can: Quickly find critical security issues through our Heads Up Display. Identify remediation that… Read more »

The Role of Security Mapping in Vulnerability Management

guest blogger    February 7, 2013

Increasingly, security management organizations are coming to rely on a unique type of geography to recognize where threats and vulnerabilities are active, and where security exploits are occurring. The geography in question maps fairly closely to the physical map of the world. Because Internet links that connect sites and users to service providers are involved, along with prevailing local Internet… Read more »

Playing Around with Game Theory: Smart Data > Big Data

Michael Roytman    February 6, 2013

There’s been a lot of talk about Big Data in the security space over the past couple of years, and it seems that almost every week a new Big Data offering enters the space, whether it’s in discussion, in development, or in production. It’s no secret that here at Risk I/O, we’ve embraced the industry’s demands and are hard at… Read more »

Five Architectural Requirements for an Agile Vulnerability Intelligence Platform

admin    January 24, 2013

This is the third post in a three-part series on Agile Risk Intelligence. The complete Agile Risk Intelligence e-book is now available. With vulnerability scanners deployed across the stack and the organization, security managers are swimming in data, but struggling to make sense of it. As I blogged about previously, current approaches lack the context and global visibility to deliver meaningful insight…. Read more »

Instinct to Insight: Five Gaps in Agile Risk Responsiveness

admin    January 17, 2013

This is the second post in a three-part series on Agile Risk Intelligence. The complete Agile Risk Intelligence e-book is now available. The thump from the far corner of the house reaches a mother’s ears. Before she is even aware of it, her subconscious begins to instinctively collect, correlate and process additional information.  Honed by millions of years of evolution and fine tuned… Read more »

The Case for Agile Risk Intelligence

admin    January 10, 2013

This is the first post in a three-part series on Agile Risk Intelligence. The complete Agile Risk Intelligence e-book is now available. Security executives have always embraced the challenging task of protecting the organizations’ users and assets. It’s a thankless job against a faceless enemy, but that’s always been part of the deal. However, today it seems like the objective… Read more »

The Top 10 Risk I/O Blog Posts of 2012

Andrea Bailiff-Gush    January 8, 2013

It’s a new year! And I would guess it will probably be filled with new and interesting ideas on mining and visualizing data so we can all make better security decisions. In honor of another year having come and gone, we’re taking a look back at our top blog posts of 2012, so you can catch up on some of the… Read more »

Crowdsourcing Vulnerability Intelligence

guest blogger    December 6, 2012

This is the first post in our guest blogging series. If you are interested in writing for Risk I/O, visit our Guest Blogging page for more information. Strictly speaking, crowdsourcing refers to a model for problem solving that depends on turning requests for information, service, or even ideas over to an unknown but reachable group of potential participants to seek… Read more »