Magecart Strikes Again
Ticketmaster, British Airways, and Newegg have all been compromised. Who’s next? Read our research to see how we discovered the breaches.
IDG Connect: 2017 State of Enterprise Digital Defense Report
Findings quantify the security management gap and business impact of external web, social, and mobile threats.
Get the Research Report
Frost & Sullivan: The Digital Threat Management Platform Advantage
The material benefits of a platform-based approach to security outside the firewall.
Read the Report
2018 Holiday Shopping Season Threat Activity: A Snapshot
The 2018 holiday shopping season was the largest ever for online retailers, but threat actors filled their pockets, too.
So what did the threat activity around this shopping frenzy look like?
Rackspace Accelerates External Digital Threat Investigation with RiskIQ PassiveTotal
Download Case Study
EMA Radar™ Q4 2017 Report
RiskIQ ranked a technology and value leader in digital threat intelligence management.
Get the Analyst Report
Are you confused by what digital risk/threat/attack surface management vendors actually do? You’re not alone.
As organizations expand their presence across web, mobile, social, and the cloud to innovate, scale, and better interact with customers, their business moves outside the protection of traditional security programs. This digital transformation involves standing up thousands of digital assets that companies may or may not know about. Meanwhile, attackers pump out thousands more that impersonate these brands to target their customers and employees. Combined, all these assets make up a digital attack surface that is beyond the purview of security teams in many organizations.
As a result, over the past few years, businesses have faced a torrent of breaches originating outside the firewall that have had disastrous consequences for their victims.
Unfortunately, like the corporate digital attack surface itself, the landscape of cybersecurity companies that claim to help defend your organization beyond the corporate perimeter has become overwhelmingly vast and continues to grow every day. With a cacophony of mixed messages flooding the market, shopping for a practical solution that solves the problem of monitoring your digital attack surface for risk has become a nightmare.
Some vendors claim to do much more than they’re capable of. Some are so frustratingly vague that it’s impossible to determine what they do. Others say they do it all but are more of a point solution, while some do a variety of things but appear to only specialize in one. It’s a headache.
To help out security folks considering RiskIQ, we are introducing a series of blogs comparing and contrasting us with vendors with which we are often compared. To begin, we’ll be looking at BitSight and Expanse.
Two names that come up frequently in conversations around mapping and monitoring a digital attack surface are RiskIQ and Expanse. Because these companies both show what a company’s web-facing presence looks like to attackers, they’re often compared and even confused for one another. However, there are enormous differences in how they go about mapping and monitoring their customers’ digital presences.
Download “Three Critical Areas of Digital Attack Surface Management: Where Does Your Solution Stand?” Here.
Some organizations turn to risk scorecard solutions such as BitSight for the evaluation of third-party vendor risk, but how useful is BitSight in helping organizations reduce the risks in their own attack surface? As overlapping vendor messages can make it difficult to gain a clear understanding of the differences between the different solution offerings, we hope to clear up some of the confusion.
Download “RiskIQ vs. BitSight: Which is more useful for Digital Attack Surface Management?” here.
Make the right choice
Over the next several months, our vendor Compare and Contrast Series will analyze even more solutions to help you make a better choice when equipping your security team to manage your digital attack surface. Stay tuned for Digital Shadows and Recorded Future next.
Webcast: Learn how #webskimming attacks work and what organizations can do to protect themselves with @RiskIQ | 4/18 @ 3:30PM ET | https://t.co/1Qe36D9NW1
Today is the deadline to file your taxes, but threat actors didn’t procrastinate. Download @RiskIQ’s 2019 #TaxSeason Threat Roundup for data and analysis around the threat landscape facing taxpayers this year https://t.co/ALAepevk15 #phishing #mobilethreats
Tax Hacks: How Seasonal Scams Cause Yearlong Problems https://t.co/QuqeibM9Xl by @kellymsheridan #taxday #taxtips #fraud #cybercrime
This #phishing page is a copy of an online IRS form for updating electronic #tax information.
A new report found 1,235 instances of similar phishing sites targeting online tax filers, and 468 suspicious URLs.
Via @forbes: Before, cyber security was practiced within the confines of the firewall, but should now traverse the entire internet https://t.co/Bg1vwGhwpp #AttackSurfaceManagement #Infosec