New Articles

  1. Internet Data Overview

    Internet Data Overview RiskIQ's Security Intelligence Service Internet Data offering provides customers with access to RiskIQ’s high volume API endpoints to directly ingest RiskIQ data into their security operations tools and technology. ...
  2. Event API POST

    Overview Within the API settings of your workspace, you can set up an API Post URL. If this URL is set, then for each event-type with API POST enabled in it's configuration settings, a response will be pushed to the Post URL for the workspace a...
  3. Events Dashboard

    Overview The Events Dashboard functions as a living report for activity RiskIQ has identified within your workspace. On the left-hand side, there are a number of facets and filters that can be used to reduce the overall data or tailor it to your ex...
  4. Global Phishing Dashboard

    Overview The Global Phishing Dashboard functions as a visual tool to understand live phishing attacks that are being observed by RiskIQ and in what locations in the world. While not functional, the Global Phishing Dashboard is meant to serve as a n...
  5. Insights Dashboard

    Overview The Insights Dashboard acts like a summary for your Digital Footprint Inventory. The dashboard is split into three sections: Global Insights, Workspace Insights and Private Insights. Each insight has a title, description and count of asset...
  6. Risk Reporting Roadmap

    Ability to analyse Risk Scores based on Organisation, Brand , Tags from Assets in Inventory. Visibility can be further controlled with Role Based Access Control. Using this feature business units can be compared and contrasted to observe best prac...
  7. Risk Reporting Metrics

    Metrics being Measured Security Posture (SP) & Threat Indicator (TI) Rank Category Metric Description 1 TI Blacklisted Hosts with Malware (High Confidence) The number of websites in the organization that have been listed on high c...
  8. Risk Categories and Sub-Categories

    Categories & Subcategories Metrics are grouped into subcategories which are in turn grouped into a parent category. The scores at both the category and sub-category levels are derived directly from the component metrics. Threat Indicators: ...
  9. Scoring Methodology

    The building block for a Risk Score is a METRIC  that measures the raw quantity of a policy violation, vulnerability, configuration, exposed service or administrative complexity in a Digital Footprint of External Facing Assets. METRICs  a...
  10. Personas & Use-Cases

    Personas Targeted: Management & Executives Defenders - Vulnerability Management teams (Managers and analysts) Remediators - Incident Response teams who are tasked with reacting to breaches.  IT and Business teams who either own...