contact us

Media Coverage

RiskSense Gets $12M

AUGUST 7, 2018 | TechRockies

RiskSense, which develops threat and vulnerability management software, has raised $12M in a Series B funding, the company announced on Tuesday. The funding was led by Spring Mountain Capital and NightDragon Security, and also included UL Ventures, Paladin Capital Group, Sun Mountain Capital, EPIC Ventures and Jump Capital.

Read Full Article

RiskSense grabs $12 million Series B

August 7, 2018 | PE Hub Network, Iris Dorbian

RiskSense, a cybersecurity company, has secured $12 million in Series B financing. Spring Mountain Capital and NightDragon Security led the round with participation from UL Ventures, Paladin Capital Group, Sun Mountain Capital, EPIC Ventures and Jump Capital.

Read Full Article

How to perform a risk assessment: Rethinking the process

JUNE 26, 2018 | CSO, DAVID STROM

The world has changed significantly in the past two years, and so have the rules around assessing cyber security risk. A combination of greater digital business penetration, a wider array of risks, and bigger consequences of cyber threats have made the world of risk management both more complex and more important than ever.

Read Full Article

125+ cybersecurity companies in healthcare to know | 2018

JUNE 25, 2018 | BACKER'S HOSPITAL REVIEW, LAURA DYRDA

Healthcare organizations face an increasing threat from cyber attacks and hospitals are spending big to ensure their patients’ data is protected. In 2017, healthcare spending on IT reached $100 billion and there were around 32,000 intrusion attacks per day on healthcare organizations, according to FortiGuard Labs, as reported by CSO. Here are more than 125 companies focused on cybersecurity for hospitals, health systems and other healthcare organizations.

Read Full Article
Alburquerque Business First

See where NM ranks for cyberattack risk

JUNE 19, 2018 | ALBUQUERQUE BUSINESS FIRST, COLLIN KRABBE

According to a report by the Ponemon Institute, an organization that conducts independent research on data protection and privacy, the Land of Enchantment has the nation’s fourth-highest risk for cybersecurity attacks.

Read Full Article

How Does Arizona Government Address Information Security?

JUNE 18, 2018 | GOVERNMENT TECHNOLOGY, DAN LOHRMANN

Mike Lettman, the state chief information security officer (CISO) in Arizona, has a wealth of cybersecurity experience across multiple states. In this exclusive interview, Mike discusses what’s hot in his state government cyberefforts and points to what’s next to keep constituent data safe.

Read Full Article

On the Path to Making IoT ‘Secure by Design’

May 15, 2018 | IoT Innovator, Dylan Davis and Sean Dillion

Internet of Things (IoT) and Industrial Internet of Things (IIoT) devices can provide great value by handling tasks with precision, consistency, and accountability that can never be achieved by human labor. Unfortunately, these devices can also create huge risk; they are often susceptible to numerous categories of security vulnerabilities and consequently attacked by hackers.

Read Full Article

A Cybersecurity Credit Score

MAY 14, 2018 | GNC, Matt Leonard

Arizona did not have much visibility into its cybersecurity vulnerabilities when Mike Lettman arrived six years ago. Since then, the state’s chief information security officer has been able to evaluate the security posture for individual assets, network and applications, across agencies and the state’s network as a whole, Lettman said.

Read Full Article
ISTP Magazine

Their Story Chats At RSA Conference 2018

MAY 2, 2018 | ITSP MAGAZINE, JOHN DASHER

ITSP magazine’s John Dasher chats with Sage Wagner from RiskSense during RSA Conference 2018 in San Francisco to discuss how to help organizations understand their attack surfaces and quantify their risks, allowing for rational prosecution of vulnerabilities and threats, as well as determining the effectiveness and prioritization of security investments.

Read Full Article

RiskSense Platform Demonstration

May 2, 2018 | Light Reading

Sage Wagner, senior security pre-sales engineer at RiskSense, provides a demo of the company’s latest technology, ‘RiskSense Solution’, a vulnerability management and cyber risk platform, which helps companies manage their cyber risks through their vulnerabilities.

Read Full Article

Cyber Pirates: The Latest Threat to Ocean Shipping

April 30, 2018 | Supply Chain Dive, Barry Hochfelder

High tech has reached the high seas, and there are no safe harbors. That point was made very clear in a recent webinar hosted by the National/International Maritime Law Enforcement Academy and presented by RiskSense, a New Mexico-based cybersecurity practitioner.

Read Full Article

Product Review: RiskSense Cyber Risk Management

April 11, 2018 | Cybersecurity Insiders

Making sense of increasing amounts of complex data is a challenge in many industries. Cybersecurity professionals must manage data generated by the countless systems in your network. Feeds from disconnected, siloed tools must be normalized and analyzed so SOC teams can appropriately prioritize remediation efforts. And that’s where RiskSense comes in.

Read Full Article
SDX Central

Should Bug Bounty Programs Pay Hackers Millions to Find Bugs?

March 23, 2018 | SDxCentral, Jessica Lyons Hardcastle

Netflix this week said it’s taking its bug bounty payouts public with Bugcrowd. It joined the likes of Cisco Meraki, Fitbit, and Square, which also recently started using the crowdsourced security program to pay, ahem, “researchers” (read: hackers) to find and report security vulnerabilities in its products.

Read Full Article
ISTP Magazine

Staying Current On The Changing Threat Landscape: The Role Of The National Vulnerability Database (NVD)

March 4, 2018 | Anand Paturi, ITSP Magazine

Managing cyber threats has never been more challenging. Breaches, hacks and malware are daily problems for organizations. Not only are threats growing in frequency and severity, they are becoming more sophisticated, making it extremely difficult for organizations to identify and stop them, and to determine which ones need to be prioritized for remediation.

Read Full Article