contact us see demo

White Papers

Cyber Risk Management: A New Approach to Responding to Complex Threats
Over the last few years, cyber threats have emerged as one of the most significant business risks facing organizations. While companies spend huge sums of money every year to maintain a security perimeter designed to fend off cyber and insider threats, daily reports of new data breaches are raising doubts about the effectiveness of these investments. This white paper features research from Forrester, as it relates to the top security technology trends to watch in 2017.
Download Now


EternalBlue: Exploit Analysis and Port to Microsoft Windows 10
On April 14, 2017, the Shadow Brokers Group released the FUZZBUNCH framework, an exploitation toolkit for Microsoft? Windows?. The framework included ETERNALBLUE, a remote kernel exploit originally targeting the Server Message Block (SMB) service on older versions of Microsoft Windows. RiskSense analyzes the root cause vulnerability and requirements needed to port the exploit to the modern Microsoft Windows 10. RiskSense identifies the essential parts of the exploit and removes the DOUBLEPULSAR dependency, defeating detection rules previously recommended by numerous governments and antivirus vendors. This analysis helps defenders better understand the exploit chain so that they can build generic defenses for the exploit rather than the payload.
Download Now


Operationalizing Cyber Risk: How to Ensure Security is Aligned with the Business
Organizations will spend $92 billion on perimeter defenses this year, yet we will continue to see a growing list of high profile organizations breached. Why are today’s strategies so ineffective against ever-evolving adversaries? And what can security leaders do to ensure that their defenses are in lockstep with what matters most to their core business? This ISMG interview transcript with Dr. Srinivas Mukkamala showcases his unique perspective on why and how security leaders must shift their thinking from a vulnerability-based security strategy to one that is risk-based and aligned with the business.
Download Now


Visualizing Cyber Risk: Defining Business Priorities for Remediation
This report examines the business drivers for a more holistic way of looking at cyber risk. There is an urgent need to be able to focus more clearly on root causes, susceptibilities, and actions that are relevant to critical business operations.
Download Now


The New Enterprise Security Model: How to Operationalize Cyber Risk Management in Today's Dynamic Threat Landscape
This white paper explores the emerging discipline of intelligence-driven cyber risk management as a response to the mounting cyber-attacks, advanced persistent threats, and insider leaks. It outlines not only today’s cyber security challenges, but provides practical advice of how to operationalize an organization’s cyber security practices across a growing attack surface.
Download Now



Reveal Cyber Risk Across a Growing Attack Surface




contact us at +1 505.217.9422

  • follow us
© 2017 RiskSense, Inc. All rights reserved. Use of this website assumes acceptance of Legal Notices, Privacy Policy, Service Level Agreement and Acceptable Use Policy.