Joining the Data Revolution

Aug 22, 2012
Ed Bellis
Chief Technology Officer, Co-founder

Share with Your Network

Here at Risk I/O, we’re really big fans of data. Given the right data you can make insightful business decisions very quickly. This is one of the core values we build into every feature release.

Risk I/O is excited to be the recipient of a DataWeek Award as a Top Innovator in the Security/e-Governance category.

With our data-driven approach to security, we’re excited to have been selected by the DataWeek Awards as a Top Innovator in the Security/e-Governance category. This is the first annual DataWeek event, which is used as a platform for data-centric
companies to discuss how big data can be harnessed. Risk I/O is honored to be joining a long list of innovative companies in accepting a DataWeek Award.

Throughout the remainder of 2012, we’ll be releasing data-centric features that will aid our users in decision support. Within the security community, we have seen a real issue with managing the mountain of data produced by vulnerability assessments, penetration testing and static analysis. There are very specific use cases that we are building into our product which include prioritization, predictive analytics, and an aggregated vulnerability database. We want our users to understand what’s the most important vulnerability to fix first and how vulnerable their data is to a specific threat. We also want our users to be able to easily access all available information on a specific vulnerability right in our product. We’ll be informing our users when these features are available.

We’re excited to be part of the Data Revolution and to be recognized for our commitment to it. Now to get back to building out some data-centric features for our users, fast and furious!

Read the Latest Content

Research Reports

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the P2P series explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities.
DOWNLOAD NOW
eBooks

5 Things Every CIO Should Know About Vulnerability Management

If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look.  Managing vulnerabilities is...
DOWNLOAD NOW

Videos

Videos

Get Started Using the Exploit Prediction Scoring System (EPSS).

Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You...
READ MORE
FacebookLinkedInTwitterYouTube

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.