Updated Articles

  1. Executive Guardian

    Product Description Senior executives and/or highly sensitive access individuals (HSA's) are a valuable target for threat actors and, if left unprotected, can represent a significant vulnerability in a company's security posture. Threat act...
  2. External Threats

    Product Description RiskIQ External Threats automates the detection, monitoring, and remediation of fraudulent websites, domains, social profiles, and mobile apps impersonating an organization. As businesses evolve and move more processes and i...
  3. JavaScript Threats

    Product Description JavaScript Threats protects customer trust in online interactions by monitoring an organization's critical web applications for malicious JavaScript attacks, such as Magecart, intent on stealing site users' sensitive ...
  4. Digital Footprint

    Product Description RiskIQ Digital Footprint continuously discovers and maps your digital attack surface to provide an ‘outside-in’ view. This visibility enables security and IT teams to identify unknowns, prioritize risk, eliminate thr...
  5. RiskIQ Illuminate for CrowdStrike

    Overview RiskIQ Illuminate for CrowdStrike gives security teams a 360° view of their attack surface to better detect threats and defend their enterprise Creates complete security visibility by bridging external and internal threat intelligen...
  6. Security Intelligence Services

    Product Description As security operations become more advanced, they will require more data to power their capabilities and instantly enrich incidents.  Security Intelligence Services provides direct, high volume access to RiskIQ data, allowi...
  7. Event User Actions

    This article provides definitions and instructions for managing events within the RiskIQ interface or API, including  Assigning event status, owner, and priority Adding notes or tags Emailing event details for feedback from teammates (UI on...
  8. Custom Events

    Custom events are available to External Threats as well as Executive Guardian or Tailored Intelligence customers, depending on the use case. Their purpose is provide a flexible way to track any pieces of information that don't fit into an ...
  9. Content Events

    Content events are used for classifying a wide range of general webpages and content that are not specifically treated as suspected phish, customer-owned websites, social media profiles, or mobile app stores to analyze against the configured policy....
  10. Social Events

    Social events are available to External Threats and/or Executive Guardian customers . They alert customers to unauthorized social profiles claiming to represent their brand in the case of External Threats and/or an executive or employee of the o...