contact us see demo

Media Coverage

JUNE 26, 2018 | CSO, DAVID STROM

The world has changed significantly in the past two years, and so have the rules around assessing cyber security risk. A combination of greater digital business penetration, a wider array of risks, and bigger consequences of cyber threats have made the world of risk management both more complex and more important than ever.

Read Full Article
JUNE 25, 2018 | BACKER'S HOSPITAL REVIEW, LAURA DYRDA

Healthcare organizations face an increasing threat from cyber attacks and hospitals are spending big to ensure their patients’ data is protected. In 2017, healthcare spending on IT reached $100 billion and there were around 32,000 intrusion attacks per day on healthcare organizations, according to FortiGuard Labs, as reported by CSO. Here are more than 125 companies focused on cybersecurity for hospitals, health systems and other healthcare organizations.

Read Full Article
Alburquerque Business First
JUNE 19, 2018 | ALBUQUERQUE BUSINESS FIRST, COLLIN KRABBE

According to a report by the Ponemon Institute, an organization that conducts independent research on data protection and privacy, the Land of Enchantment has the nation’s fourth-highest risk for cybersecurity attacks.

Read Full Article
JUNE 18, 2018 | GOVERNMENT TECHNOLOGY, DAN LOHRMANN

Mike Lettman, the state chief information security officer (CISO) in Arizona, has a wealth of cybersecurity experience across multiple states. In this exclusive interview, Mike discusses what’s hot in his state government cyberefforts and points to what’s next to keep constituent data safe.

Read Full Article
May 15, 2018 | IoT Innovator, Dylan Davis and Sean Dillion

Internet of Things (IoT) and Industrial Internet of Things (IIoT) devices can provide great value by handling tasks with precision, consistency, and accountability that can never be achieved by human labor. Unfortunately, these devices can also create huge risk; they are often susceptible to numerous categories of security vulnerabilities and consequently attacked by hackers.

Read Full Article
MAY 14, 2018 | GNC, Matt Leonard

Arizona did not have much visibility into its cybersecurity vulnerabilities when Mike Lettman arrived six years ago. Since then, the state’s chief information security officer has been able to evaluate the security posture for individual assets, network and applications, across agencies and the state’s network as a whole, Lettman said.

Read Full Article
ISTP Magazine
MAY 2, 2018 | ITSP MAGAZINE, JOHN DASHER

ITSP magazine’s John Dasher chats with Sage Wagner from RiskSense during RSA Conference 2018 in San Francisco to discuss how to help organizations understand their attack surfaces and quantify their risks, allowing for rational prosecution of vulnerabilities and threats, as well as determining the effectiveness and prioritization of security investments.

Read Full Article
May 2, 2018 | Light Reading

Sage Wagner, senior security pre-sales engineer at RiskSense, provides a demo of the company’s latest technology, ‘RiskSense Solution’, a vulnerability management and cyber risk platform, which helps companies manage their cyber risks through their vulnerabilities.

Read Full Article
April 30, 2018 | Supply Chain Dive, Barry Hochfelder

High tech has reached the high seas, and there are no safe harbors. That point was made very clear in a recent webinar hosted by the National/International Maritime Law Enforcement Academy and presented by RiskSense, a New Mexico-based cybersecurity practitioner.

Read Full Article
April 11, 2018 | Cybersecurity Insiders

Making sense of increasing amounts of complex data is a challenge in many industries. Cybersecurity professionals must manage data generated by the countless systems in your network. Feeds from disconnected, siloed tools must be normalized and analyzed so SOC teams can appropriately prioritize remediation efforts. And that’s where RiskSense comes in.

Read Full Article
SDX Central
March 23, 2018 | SDxCentral, Jessica Lyons Hardcastle

Netflix this week said it’s taking its bug bounty payouts public with Bugcrowd. It joined the likes of Cisco Meraki, Fitbit, and Square, which also recently started using the crowdsourced security program to pay, ahem, “researchers” (read: hackers) to find and report security vulnerabilities in its products.

Read Full Article
ISTP Magazine
March 4, 2018 | Anand Paturi, ITSP Magazine

Managing cyber threats has never been more challenging. Breaches, hacks and malware are daily problems for organizations. Not only are threats growing in frequency and severity, they are becoming more sophisticated, making it extremely difficult for organizations to identify and stop them, and to determine which ones need to be prioritized for remediation.

Read Full Article
Security Current
January 2, 2018 | Security Current

Srinivas Mukkamala grew up in India, where he attained his undergraduate degree in Computer Sciences and Engineering. His focus of study was artificial intelligence (AI). He began his career working as an intern for the Indian Space Research Organisation, the space agency of the Government of India, working on artificial neural networks for space trajectory.

Read Full Article
Venture Beat
November 1, 2017 | Venture Beat, Ken Elefant

Machine learning and artificial intelligence are timely subjects that spark the public imagination. In 2016, between $26 billion and $39 billion was invested in AI, according to recent estimates from the McKinsey Global Institute, a leading private-sector think tank. That number is three times the amount spent just three years prior, an increase driven by entrepreneurial activity and technological advancements.

Read Full Article