Tag Archives: vulnerability intelligence

See Our New Features in Action!

Andrea Bailiff-Gush    April 9, 2013

As you may recall reading, our development team has been busy over the last few weeks rolling out new features that will make it even easier to manage and monitor your vulnerabilities.We want to invite you to join us on Wednesday, April 17th at 2:00PM ET for a webinar given by Risk I/O CEO, Ed Bellis. Ed will provide an overview of these… Read more »

Playing Around with Game Theory: Smart Data > Big Data

Michael Roytman    February 6, 2013

There’s been a lot of talk about Big Data in the security space over the past couple of years, and it seems that almost every week a new Big Data offering enters the space, whether it’s in discussion, in development, or in production. It’s no secret that here at Risk I/O, we’ve embraced the industry’s demands and are hard at… Read more »

Using Databases to Automate Assessment and Remediation

guest blogger    January 31, 2013

The National Vulnerability Database (aka NVD) is a US Government repository for standards-based vulnerability management data. Its content is represented using the Security Content Automation Protocol, SCAP (pronounced “ess-cap”). SCAP is designed to facilitate reporting, collection, management, and monitoring of vulnerability data through automated software facilities. SCAP encompasses a wide range of inputs and information, and enables automation of vulnerability management,… Read more »

Automate All The Things: Our New-and-Improved API

Mike    January 29, 2013

We recently updated our API and wanted to let you know about it. For those of you unfamiliar with the Risk I/O API, it can be used to automate many functions of Risk I/O including the ability to add vulnerabilities from the few scanners Risk I/O doesn’t directly support, information gleaned from manual assessments, data integration between SIEM, GRC and… Read more »

Five Architectural Requirements for an Agile Vulnerability Intelligence Platform

admin    January 24, 2013

This is the third post in a three-part series on Agile Risk Intelligence. The complete Agile Risk Intelligence e-book is now available. With vulnerability scanners deployed across the stack and the organization, security managers are swimming in data, but struggling to make sense of it. As I blogged about previously, current approaches lack the context and global visibility to deliver meaningful insight…. Read more »

Instinct to Insight: Five Gaps in Agile Risk Responsiveness

admin    January 17, 2013

This is the second post in a three-part series on Agile Risk Intelligence. The complete Agile Risk Intelligence e-book is now available. The thump from the far corner of the house reaches a mother’s ears. Before she is even aware of it, her subconscious begins to instinctively collect, correlate and process additional information.  Honed by millions of years of evolution and fine tuned… Read more »

The Case for Agile Risk Intelligence

admin    January 10, 2013

This is the first post in a three-part series on Agile Risk Intelligence. The complete Agile Risk Intelligence e-book is now available. Security executives have always embraced the challenging task of protecting the organizations’ users and assets. It’s a thankless job against a faceless enemy, but that’s always been part of the deal. However, today it seems like the objective… Read more »

The Top 10 Risk I/O Blog Posts of 2012

Andrea Bailiff-Gush    January 8, 2013

It’s a new year! And I would guess it will probably be filled with new and interesting ideas on mining and visualizing data so we can all make better security decisions. In honor of another year having come and gone, we’re taking a look back at our top blog posts of 2012, so you can catch up on some of the… Read more »