Magecart Strikes Again
Ticketmaster, British Airways, and Newegg have all been compromised. Who’s next? Read our research to see how we discovered the breaches.
IDG Connect: 2017 State of Enterprise Digital Defense Report
Findings quantify the security management gap and business impact of external web, social, and mobile threats.
Get the Research Report
Frost & Sullivan: The Digital Threat Management Platform Advantage
The material benefits of a platform-based approach to security outside the firewall.
Read the Report
2018 Holiday Shopping Season Threat Activity: A Snapshot
The 2018 holiday shopping season was the largest ever for online retailers, but threat actors filled their pockets, too.
So what did the threat activity around this shopping frenzy look like?
Rackspace Accelerates External Digital Threat Investigation with RiskIQ PassiveTotal
Download Case Study
EMA Radar™ Q4 2017 Report
RiskIQ ranked a technology and value leader in digital threat intelligence management.
Get the Analyst Report
With the rapid growth of cybercrime and new concerns of data and system manipulation, vulnerability management is more important than ever. At the same time, the task has changed tremendously with organizations typically having more than half of their digital assets outside the corporate firewall.
Now your weakest points may not be addressed by conventional vulnerability tools and audits. Understanding the organization’s true digital footprint is the starting point. Having a fully up-to-date view of your constantly changing digital assets is also essential. Whether vulnerability discovery and assessment is performed in-house or through an third-party service, the challenge is the same.
Can you discover and distinguish between all of the sanctioned, rogue, and phony digital assets associated with your company? Cybercriminals are likely scanning your digital footprint to find the easiest path into your network—can you? Are some digital assets a launching point for credential theft? Are some a source to infect or infiltrate customers, partners, and employees? How are external digital assets configured? What software are they running? How is access managed?
Read the GDPR White Paper
Shadow IT and rogue departments buying or using their own technology independent from sanctioned IT channels are commonplace in today’s empowered digital organization. These cheap or haphazard assets are acquired without security and IT processes and without regard for necessary controls. So finding these assets is critical, along with inventorying the ones you can point at in a server closet.
Read the Subdomain Infringement White Paper
RiskIQ uses full internet scanning technology and amasses terabytes of online data to discover and inventory the assets that belong to any organization which exist outside the firewall. On average, discovery by RiskIQ will yield 30% more assets than were thought to exist. These assets may include domains, IP blocks, name servers, and web servers. Once known, the RiskIQ platform can extract, filter, and report on the software that powers those assets.
This makes the job of vulnerability analysts and threat defenders far easier, while also increasing confidence that all the present gaps in your security posture are known and addressed.
With RiskIQ, you can:
Discover digital assets automatically with RiskIQ’s exclusive crawling technology and our extensive database of passive DNS and WHOIS information.
Maintain visibility into your dynamic digital footprint. RiskIQ continuously scans your inventory of assets, providing asset and vulnerability management teams with the assurance that assets are secure, compliant, and running up-to-date software.
Know when there are changes to your existing assets. After identification, RiskIQ continuously scans the internet to discover new assets and alert on changes to identify non-compliance or compromise.