contact us see demo

Solution Briefs

Election Systems – Votes Must Count

Our nation’s voting systems are vulnerable to cyberattack. Even though most states have moved away from voting equipment that does not produce a paper trail, there is still real risk. When experts talk about “voting systems,” that phrase encompasses the entire process of voting: how citizens register, how they find their polling places, how they check in, how they cast their ballots and, ultimately, how they find out who won. One of the biggest problems is that each county has its own way of managing the process, and security oversight, and are ill-prepared or under-staffed to execute ‘what-if’ attack scenarios.

Download

RiskSense Attack Surface Validation for Networks

RiskSense Attack Surface Validation for Networks helps identify, prioritize threats, and provides our clients with immediate results allowing them to secure their business and assets. Networks pose the largest expanding attack surface as organizations grow and adopt new digital business and customer to partner engagement strategies. Vulnerability density is high and it’s important to understand where the true exposure points lie.

Download

RiskSense Attack Surface Validation for Web Applications

The RiskSense Attack Surface Validation for Web Applications provides a comprehensive and valuable security posture assessment that keeps pace with your business needs. RiskSense delivers fast insights, prioritizing actions with clear paths for remediation.

Download

RiskSense Vulnerability Discovery

The RiskSense Vulnerability Discovery service greatly reduces an organization’s risk profile. Previously unknown network, application, and database vulnerabilities emerge daily, and organizations realize that they must detect and mitigate these vulnerabilities before a cyber adversary can exploit them. The quantity and diversity of vulnerabilities is makes it difficult for organizations to confidently manage risk exposure by themselves. RiskSense Vulnerability Discovery helps organizations, from mid-size to Fortune 500, to quickly identify, quantify, and ultimately prioritize their remediation actions.

Download

Internet of Medical Things (IoMT)

Internet of Medical Things (IoMT) is here and the risks are real. Find out how your medical devices could be compromised and how RiskSense’s solution can assist you in uncovering and diagnosing your cyber risks.

Download
Continuous Application Security Testing and Risk Based Remediation Prioritization with RiskSense and WhiteHat Security

Continuous Application Security Testing and Risk Based Remediation Prioritization with RiskSense and WhiteHat Security

RiskSense has partnered with WhiteHat Security to continuously ingest newly discovered vulnerability findings through API-based integration, correlate them with the external threat data, and prioritize their remediation based on the risk and business impact they pose to target organizations. RiskSense provides a seamless workflow to quickly guide the remediation efforts and continuously monitor the results based on closed-loop monitoring process.

Download
Apache Struts Spotlight Report

Apache Struts Spotlight Report

In this spotlight report, we analyze Apache Struts-related vulnerability weaponization patterns spanning the last decade. We also provide insight into exploit patterns and explain how these patterns can define an organization’s risk management strategy.

Download
EternalBlue: Exploit Analysis and Port to Microsoft Windows 10

EternalBlue: Exploit Analysis and Port to Microsoft Windows 10

On April 14, 2017, the Shadow Brokers Group released the FUZZBUNCH framework, an exploitation toolkit for Microsoft Windows. The framework included ETERNALBLUE, a remote kernel exploit originally targeting the Server Message Block (SMB) service on older versions of Microsoft Windows. RiskSense analyzes the root cause vulnerability and requirements needed to port the exploit to the modern Microsoft Windows 10. RiskSense identifies the essential parts of the exploit and removes the DOUBLEPULSAR dependency, defeating detection rules previously recommended by numerous governments and antivirus vendors. This analysis helps defenders better understand the exploit chain so that they can build generic defenses for the exploit rather than the payload.

Download
RiskSense Tech Brief

Visualization Techniques for Efficient Malware Detection

Traditional tools for reverse engineering of binary and portable executable files are limited to heavy text-based output, thus requiring skilled analysts to use them. In this white paper, RiskSense cyber security experts share hands-on advice on techniques that will visualize portable executable files, which will help security analysts with basic skills to quickly understand their underlying structure.

Download
Risksense Tech Brief

Mobile Malware Visual Analytics and Similarities of Attack Toolkits

In this technical white paper, RiskSense cyber security experts present similarity measures that can assist the anti-virus community to ensure a variant of a known malware can still be detected without the need of creating a signature; a similarity measure is calculated to produce a matrix of similarity scores that can be utilized to determine the likelihood that a piece of code or binary under inspection belongs to a particular malware family.

Download
Prioritize Your Remediation Across a Growing Attack Surface

RiskSense

contact us at +1 505.217.9422

  • follow us