IoT
7/21/2017
10:10 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

New RiskSense Service Detects IoT and OT Network Security Threats/Vulnerabilities

Cyber Risk Management Leader Announces New Offering to Cover Emerging Technologies and Environments including Smart Logistics Systems, Internet of Things, and Automotive Control Systems

SUNNYVALE, Calif. and ALBUQUERQUE, N.M., July 19, 2017 /PRNewswire/ --  RiskSense®, Inc., the pioneer and market leader in pro-active cyber risk management, today announced it has expanded its RiskSense Attack Surface Validation capabilities beyond networks, Web applications, and databases to Internet of Things (IoT) devices and Operational Technology (OT) networks to provide a holistic view of an organization's cyber risk exposure.

Organizations are already faced with monitoring and protecting a wide and deep attack surface that spans the network, endpoints, applications, cloud services, and mobile devices. The advent of microservices, connected IoT devices, and erosion of the air-gap security perimeter around industrial control systems (ICS) is extending this surface area exponentially.

"For decades, organizations have focused their security efforts on network perimeter defenses to protect servers, endpoints, and network equipment," said Dr. Srinivas Mukkamala, co-founder and CEO at RiskSense. "However, in an interconnected world, a 'hardware-defined' approach has lost its relevance. As organizations transition to software-defined networks, they need to look beyond the network layer to protect their IT assets. RiskSense's expanded Attack Surface Validation was designed to address this visibility gap and the risks associated with it."

RiskSense has expanded its Attack Surface Validation capabilities to cover the following technologies and environments:

- Microservices and containers;
- Smart logistic systems (i.e., smart vending machines);
- Internet of Things (i.e., irrigation systems; traffic guidance systems);
- Proprietary healthcare systems (i.e., pacemakers);
- Internet-connected physical access control systems (i.e., mobile keyless entry systems);
- Industrial control systems (i.e., electrical grid distribution control systems); and
- Self-driving car technology and automotive control systems.

RiskSense has already implemented these capabilities with customers in key industry sectors. The RiskSense Attack Surface Validation Service provides a fully-managed assessment of vulnerabilities most likely to be exploited by cyber adversaries to infiltrate an organization and carry out lateral attacks inside the network. This service provides the visibility, prioritization, and actionable remediation recommendations to shrink an organization's attack surface and reduce overall cyber risk exposure.  

The RiskSense Attack Surface Validation Service is delivered via the company's award-winning RiskSense Platform, which contextualizes scanned data with external threat information. The resulting threat intelligence is then supplemented with human-interactive machine learning analysis. This leads to a more accurate prioritization of risk impacts. In addition, the RiskSense Platform provides synchronous access to findings in real-time and can be used to quickly orchestrate remediation actions and monitor the results. The platform is supported by a deep bench of industry-leading security researchers and exploit writers. 

About RiskSense
RiskSense®, Inc., is the pioneer and market leader in pro-active cyber risk management. The company enables enterprises and governments to reveal cyber risk, quickly orchestrate remediation, and monitor the results. This is done by unifying and contextualizing internal security intelligence, external threat data, and business criticality across a growing attack surface.

The company's Software-as-a-Service (SaaS) platform transforms cyber risk management into a more pro-active, collaborative, and real-time discipline. The RiskSense Platform™ embodies the expertise and intimate knowledge gained from real world experience in defending critical networks from the world's most dangerous cyber adversaries.

By leveraging RiskSense cyber risk management solutions, organizations can significantly shorten time-to-remediation, increase operational efficiency, strengthen their security programs, heighten response readiness, reduce costs, and ultimately minimize cyber risks. For more information, please visit www.risksense.com or follow us on Twitter at @RiskSense.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Ticketmaster Breach Part of Massive Payment Card Hacking Campaign
Jai Vijayan, Freelance writer,  7/10/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14084
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for MKCB, an Ethereum token. If the owner sets the value of sellPrice to a large number in setPrices() then the "amount * sellPrice" will cause an integer overflow in sell().
CVE-2018-14085
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for UserWallet 0x0a7bca9FB7AfF26c6ED8029BB6f0F5D291587c42, an Ethereum token. First, suppose that the owner adds the evil contract address to his sweepers. The evil contract looks like this: contract Exploit { uint public start; function swe...
CVE-2018-14086
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for SingaporeCoinOrigin (SCO), an Ethereum token. The contract has an integer overflow. If the owner sets the value of sellPrice to a large number in setPrices() then the "amount * sellPrice" will cause an integer overflow in sell(...
CVE-2018-14087
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for EUC (EUC), an Ethereum token. The contract has an integer overflow. If the owner sets the value of buyPrice to a large number in setPrices() then the "msg.value * buyPrice" will cause an integer overflow in the fallback functio...
CVE-2018-14088
PUBLISHED: 2018-07-16
An issue was discovered in a smart contract implementation for STeX White List (STE(WL)), an Ethereum token. The contract has an integer overflow. If the owner sets the value of amount to a large number then the "amount * 1000000000000000" will cause an integer overflow in withdrawToFounde...