Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

RiskSense Introduces Full Spectrum Risk-Based Vulnerability Management

New RiskSense SRS Outside-In Capabilities Extend Existing Inside-Out Risk Scoring and Prioritization to Provide 360° View of Threats

RiskSense, Inc., pioneering risk-based vulnerability management and prioritization, introduced Full Spectrum RBVM (Risk-based Vulnerability Management) that automatically discovers, analyzes, scores, and prioritizes both internal and external-facing security threat exposure across an organization’s IT infrastructure and applications. The cloud-delivered RiskSense solution now combines RBVM with RiskSense SRSTM (Security Rating Service) to provide 360 degree visibility that eliminates security gaps and enables security teams to measure, prioritize, and control both inside-out and outside-in risks from one integrated console.

.@RiskSense introduces full spectrum risk-based #vulnerabilitymanagement with new SRS outside-in capabilities that extend existing inside-out risk scoring and prioritization to provide 360° view of threats

“In our opinion, there are two unique features of the RiskSense platform for IT management,” said Dr. Alea Fairchild, Director, Constantia Institute. “The first is its ability to contextualize the threat landscape to highlight priorities and position the current security posture of the company. And the other is to compare the situation of the company to others in its industry to benchmark within the industry domain how effectively their cybersecurity efforts have been deployed. It puts the security team in more of an offensive (vs. defensive) mode towards its cybersecurity efforts and outcomes.”

Recommended AI News: Chainalysis And Paxful Create New Compliance Standard For Peer-To-Peer Cryptocurrency Exchanges

Related Posts
1 of 15,333

The new RiskSense SRSTM capabilities, which are fully integrated with the RiskSense platform, require nothing more than a second-level domain name (yourcompany.com, for example) to start performing a continuous, independent, quantitative discovery and analysis of all internet-accessible assets. It generates an external RiskSense Security Score, or xRS3, across key security components including network security, application security, patching cadence, email security, DNS security, and IP reputation. A benchmarking comparison is also provided, which allows organizations to compare their cybersecurity posture against those of industry peers.

“By providing an ‘outside-in’ perspective into an organization’s cybersecurity posture, RiskSense SRS extends our existing ‘inside-out’ approach to vulnerability management and remediation prioritization,” said Dr. Srinivas Mukkamala, CEO of RiskSense. “SRS provides a quantified ‘hacker’s view’, that automatically discovers threats in internet-facing infrastructure including undocumented and misconfigured systems, externally accessible databases, as well as exposed cloud, container, and SaaS apps.”

Recommended AI News: Identity Theft is Booming; Your SSN Sells for Less than $4 on Darknet

Each xRS3 score takes into account observed security best practices, past incidents, security weaknesses on externally-accessible assets, information leakage, and activity on the Dark Web to reflect an organization’s overall security stance. These scores facilitate initial benchmarking and ongoing measurement, meaningful prioritization of vulnerabilities and prioritized remediation activities, as well as a comparison with industry peers. The RiskSense platform helps users quickly orchestrate remediation actions; asset grouping, ticket assignment, details and workflows for handling risk acceptance, false positives, and validation options that track the corrective actions and measurements to confidently know when vulnerabilities have been successfully resolved.

Recommended AI News: How Regular People Are Breaking Into Tech From Non-Tech Jobs

Leave A Reply

Your email address will not be published.