Executive Guardian
Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
A recent RiskIQ study of the 30 largest UK businesses showed that each had an average of 3,315 web properties. The majority of these were outside the corporate firewall. These findings are similar, if not substantially lower, to what one would expect of US businesses.
Digital business initiatives often move quickly, and often without the involvement of the company’s security team. Business units may act on their own volition, and groups may choose to partner with other firms to take advantage of optimal timing. Individual employees may also act on their own to establish external digital assets. Intuitively, business leaders may know that resources would be more secure run from inside the corporate perimeter, but the potential gains and strategic stakes mean “Damn the torpedoes; we’re going in!”
Digital assets may take the form of a traditional website or microsite, but they also may exist as a social media property or a portion of an existing third-party site. Additionally, with the great advantages and expectations for mobile apps, the asset may take the form of a new or modified app.
Read more in our blog and view our infographic below.
Download