Flashpoint has completed its acquisition of Risk Based Security (RBS), a Richmond, Virginia-based company that specializes in vulnerability intelligence, breach data, and vendor risk ratings.
On Tuesday, Flashpoint and Risk Based Security hosted a panel to address the ongoing Log4Shell vulnerability. Below are key highlights from the discussion. For more, watch the entire event here.
Running a vulnerability scan heavily taxes your network, not to mention security teams, to the point where it can impact the operation of a business. In some cases we have even seen scanning causing shutdowns, resulting in millions of lost revenue.
AXA XL is the P&C and specialty risk division of AXA, known for solving even the most complex risks. AXA XL offers traditional and innovative insurance solutions and services in over 200 countries and territories.
A Tech News World report based on a recent study by DoControl found that the average 1,000-person company using SaaS applications exposes its data to between 1,000 and 15,000 external collaborators, and between 200 and 3,000 companies have access to a company’s data.
Since 2015, SITA has relied on VulnDB to unite their IT Security and Risk Management teams under one ticketing system. By moving away from a slow and disruptive legacy scanning approach, SITA is fueled by powerful and comprehensive vulnerability intelligence.
Managing a stable of threat intelligence vendors is an inherently inexact science; "apple-to-apple" comparisons are hard to come by, and balanced feedback from internal consumers even more so.
Before joining Flashpoint, Director of Risk Intelligence Strategy Mike Smola led Walmart’s Data Assurance and Cyber Intelligence team and has more than 25 years of experience building and leading security teams.
Most professionals know that they need an intelligence program, but do not know where to start. My aim is to help make this process easier, as I helped stand up and evolve a risk intelligence program at one of the largest retailers in the world.
Has your organization's data has been breached? Risks to data security show up on the dark web in these 10 different ways.
Acceptable business risks must be managed, and none more so than those associated with external vendors who often have intimate access to infrastructure or business data. As we’ve seen with numerous breaches where attackers were able to leverage a weakness in a contractor or service provider, third-party risk must be assessed and mitigated during the early stages of such a partnership, as well as throughout the relationship.
Companies in the innovation-driven pharmaceutical industry are no strangers to risk. Operational risk is an inherent aspect of pharmaceutical research and development, with 4.9 percent of new drugs making it from first toxicity dose to final market approval. Pharmaceutical companies also face financial and strategic risks when bringing new drugs to market, as well as compliance risks from navigating the ever-changing regulatory landscape.
Contact Sales