10:10 AM
Dark Reading
Dark Reading
Products and Releases

New RiskSense Service Detects IoT and OT Network Security Threats/Vulnerabilities

Cyber Risk Management Leader Announces New Offering to Cover Emerging Technologies and Environments including Smart Logistics Systems, Internet of Things, and Automotive Control Systems

SUNNYVALE, Calif. and ALBUQUERQUE, N.M., July 19, 2017 /PRNewswire/ --  RiskSense®, Inc., the pioneer and market leader in pro-active cyber risk management, today announced it has expanded its RiskSense Attack Surface Validation capabilities beyond networks, Web applications, and databases to Internet of Things (IoT) devices and Operational Technology (OT) networks to provide a holistic view of an organization's cyber risk exposure.

Organizations are already faced with monitoring and protecting a wide and deep attack surface that spans the network, endpoints, applications, cloud services, and mobile devices. The advent of microservices, connected IoT devices, and erosion of the air-gap security perimeter around industrial control systems (ICS) is extending this surface area exponentially.

"For decades, organizations have focused their security efforts on network perimeter defenses to protect servers, endpoints, and network equipment," said Dr. Srinivas Mukkamala, co-founder and CEO at RiskSense. "However, in an interconnected world, a 'hardware-defined' approach has lost its relevance. As organizations transition to software-defined networks, they need to look beyond the network layer to protect their IT assets. RiskSense's expanded Attack Surface Validation was designed to address this visibility gap and the risks associated with it."

RiskSense has expanded its Attack Surface Validation capabilities to cover the following technologies and environments:

- Microservices and containers;
- Smart logistic systems (i.e., smart vending machines);
- Internet of Things (i.e., irrigation systems; traffic guidance systems);
- Proprietary healthcare systems (i.e., pacemakers);
- Internet-connected physical access control systems (i.e., mobile keyless entry systems);
- Industrial control systems (i.e., electrical grid distribution control systems); and
- Self-driving car technology and automotive control systems.

RiskSense has already implemented these capabilities with customers in key industry sectors. The RiskSense Attack Surface Validation Service provides a fully-managed assessment of vulnerabilities most likely to be exploited by cyber adversaries to infiltrate an organization and carry out lateral attacks inside the network. This service provides the visibility, prioritization, and actionable remediation recommendations to shrink an organization's attack surface and reduce overall cyber risk exposure.  

The RiskSense Attack Surface Validation Service is delivered via the company's award-winning RiskSense Platform, which contextualizes scanned data with external threat information. The resulting threat intelligence is then supplemented with human-interactive machine learning analysis. This leads to a more accurate prioritization of risk impacts. In addition, the RiskSense Platform provides synchronous access to findings in real-time and can be used to quickly orchestrate remediation actions and monitor the results. The platform is supported by a deep bench of industry-leading security researchers and exploit writers. 

About RiskSense
RiskSense®, Inc., is the pioneer and market leader in pro-active cyber risk management. The company enables enterprises and governments to reveal cyber risk, quickly orchestrate remediation, and monitor the results. This is done by unifying and contextualizing internal security intelligence, external threat data, and business criticality across a growing attack surface.

The company's Software-as-a-Service (SaaS) platform transforms cyber risk management into a more pro-active, collaborative, and real-time discipline. The RiskSense Platform™ embodies the expertise and intimate knowledge gained from real world experience in defending critical networks from the world's most dangerous cyber adversaries.

By leveraging RiskSense cyber risk management solutions, organizations can significantly shorten time-to-remediation, increase operational efficiency, strengthen their security programs, heighten response readiness, reduce costs, and ultimately minimize cyber risks. For more information, please visit or follow us on Twitter at @RiskSense.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/14/2018
IoT Product Safety: If It Appears Too Good to Be True, It Probably Is
Pat Osborne, Principal - Executive Consultant at Outhaul Consulting, LLC, & Cybersecurity Advisor for the Security Innovation Center,  3/12/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.