Security Ratings Frequently Asked Questions (FAQ)

ThreatNG Security Ratings: Technically Detailed and Substantiated Assessments

This FAQ explores ThreatNG Security Ratings, explaining how they provide a data-driven assessment of an organization's external vulnerability landscape. It also explores the benefits, methodologies, and use cases of ThreatNG Security Ratings, highlighting how they empower various organizational roles to make informed decisions and strengthen their cybersecurity posture.

General Questions

  • ThreatNG Security Ratings provide a comprehensive, data-driven assessment of an organization's external vulnerability landscape using External Attack Surface Management (EASM), Digital Risk Protection (DRP), and threat intelligence.

  • ThreatNG Security Ratings go beyond traditional assessments by providing a holistic view of the external attack surface, including social media, leaked code repositories, and cloud configurations.

  • ThreatNG Security Ratings provide actionable intelligence for informed decisions, unveil the complete security landscape, and unmask cybersecurity blind spots.

  • ThreatNG Security Ratings cater to the unique needs of various roles and titles involved in cybersecurity by offering:

    • Actionable Intelligence: Security-focused roles (CISO, Security Manager, Security Analyst) gain insights into the likelihood and potential impact of attacks, enabling them to prioritize and respond effectively.  

    • Comprehensive Security Landscape: IT and Risk Management roles (CIO, IT Manager, Risk Manager) gain a holistic view of the organization's external security posture, including vulnerabilities and potential threats.  

    • Unmasking Blind Spots: All roles benefit from identifying and addressing hidden vulnerabilities that traditional security assessments might miss, leading to a more proactive and comprehensive security approach.  

    • Tailored Reporting: Various roles, including executives (CEO, COO) and other stakeholders, receive customized reports that cater to their specific needs and priorities.  

    Collaboration and Decision-Making Tools: All roles involved in cybersecurity benefit from seamless collaboration and informed decision-making.

  • ThreatNG Security Ratings offer various features and capabilities that cater to the specific search requirements of different roles and titles:

  • ThreatNG Security Ratings leverage the ThreatNG Digital Presence Triad: Feasibility, Believability, and Impact.

  • Feasibility assesses how easily attackers could exploit vulnerabilities in the external attack surface, including social media, leaked code repositories, and cloud configurations.

  • Believability delves into specific attack vectors (phishing, ransomware) and potential consequences (data leaks, brand damage) to provide a realistic picture of threats.

  • Impact considers the potential consequences of a successful attack, prioritizing threats based on their severity.

  • The ThreatNG Exposure Score comprehensively measures an organization’s external cybersecurity posture, combining insights from multiple areas, including External Attack Surface, Vulnerability Beyond Technology, and a Holistic View of Risk.

  • The ThreatNG Exposure Score covers External Attack Surface (web applications, subdomains), Vulnerability Beyond Technology (financial distress, brand damage), and a Holistic View of Risk (cyber risk, ESG exposure, supply chain security, breach/ransomware threats).

  • ThreatNG Security Ratings offer a comprehensive approach by incorporating External Attack Surface Management (EASM), Digital Risk Protection (DRP), and Intelligence Repositories.

  •  EASM unveils vulnerabilities beyond the firewall, provides actionable insights, and offers a holistic picture for more intelligent decisions.

  • DRP enables proactive threat detection beyond the perimeter, provides data-driven insights for prioritized action, and allows risk management across the digital ecosystem.

  • Intelligence Repositories act as a threat encyclopedia, providing real-world threat prioritization and actionable insights based on continuous monitoring.

  • ThreatNG Security Ratings Reporting provides unparalleled visibility across the ecosystem, actionable insights tailored to different audiences, prioritization based on real-world impact, and continuous visibility for staying ahead of threats.

  • ThreatNG Security Ratings Reporting offers a comprehensive view of the entire digital ecosystem, including third-party vendors and their security posture.

  • ThreatNG Security Ratings Reporting offers various reporting formats catering to different organizational audiences, including Executive, Technical Detail, and Inventory reports.

  • ThreatNG Security Ratings Reporting prioritizes threats based on real-world risk and potential impact, using information from EASM, DRP, and intelligence repositories.

  • RBAC ensures stakeholders across the organization, third-parties, and supply chain have access to the information they need while safeguarding sensitive data.

  • CEQs are dynamically generated questionnaires tailored to the risks identified by EASM, DRP, and intelligence repositories, ensuring all parties involved are asking the right questions for accurate risk assessment and mitigation.

  • ThreatNG offers customizable risk configuration and scoring, dynamic entity management, and policy exception management.

Security Ratings Use Cases

Security Ratings Categories

  • ThreatNG covers a wide range of security ratings categories, which can be grouped as follows:

    Application Security:

    • Application Security: Assesses the overall security posture of applications, including vulnerabilities and potential risks.

    • Information Leak: Evaluates the risk of sensitive information being leaked from applications.

    • Web Encryption: Assesses the strength and effectiveness of web encryption used by applications.

    Network Security:

    • DNS Health: Measures the health and performance of DNS infrastructure.

    • DNS Security: Evaluates the security measures in place to protect DNS infrastructure from attacks.

    • IP Reputation: Assesses the reputation of IP addresses associated with the organization.

    • Network Filtering: Evaluates the effectiveness of network filtering mechanisms in blocking malicious traffic.

    • Network Security: Assesses the overall security posture of the network infrastructure.

    Endpoint Security:

    • Endpoint Security: Evaluates the security measures in place to protect endpoints (computers, mobile devices) from threats.

    • Software Patching: Assesses the timeliness and effectiveness of software patching processes.

    Security Posture and Events:

    • Breach Events: Tracks and analyzes security breaches and incidents.

    • Compromised Systems: Identifies and monitors compromised systems within the organization.

    • Hacker Chatter: Monitors online discussions and forums for mentions of potential threats or attacks.

    • Public Disclosures: Tracks public disclosures of security vulnerabilities and incidents.

    • System Reputation: Assesses the reputation of systems and servers associated with the organization.

    Other Categories:

    • Diligence: Evaluates the level of due diligence performed in security practices.

    • Patching Cadence: Measures the frequency and regularity of security patching.

    • Social Engineering: Assesses the organization's susceptibility to social engineering attacks.

    • System Hosting: Evaluates the security posture of hosting providers and infrastructure.

    • User Behavior: Analyzes user behavior patterns to identify potential security risks.