This week, we've launched our new musubu.io site to showcase our practical network information API. With Musubu, network analysts, engineers, and cybersecurity professionals now have an easy way to gather core network information by IP Address. If you're already using...
Trump reportedly kills cybersecurity coordinator position, while many agencies continue to play catch-up in their defenses.
05/07/2018 – 6 Reasons Your Threat Intelligence Process Needs Musubu
Musubu provides an alternative to buying data feeds, building threat intelligence repositories, and authoring analytics, all while providing unparalleled insight into the quality of your network traffic.
04/09/2018 – CIO Applications recognizes R2i as a Top 25 Cybersecurity Company
In an interview with CIO Applications, Wayne Wheeles, CEO/Founder of Release 2 Innovations, shares his insights on the company’s solutions that help them stay ahead in the industry.
via CIO Applications
03/08/2018 – Why Cryptocurrencies Are Dangerous for Enterprises
Coin mining and trading activities by employees and by hackers is a considerable security problem in the enterprise – infecting enterprise resources with malware, making systems vulnerable to cyberthieves, and draining electricity.
02/20/2018 – R2i Announces Musubu, the Premium Threat Intelligence Engine System
In a market amassed in blacklists, whitelists, and watchlists, Musubu is powered by leading cyber analytics, engineered to confront the threats of today and tomorrow.
02/14/2018 – Smashed World’s Records for Most Data Breaches, Exposed Information
2017 was a record-breaking year: a total of 5,207 breaches and 7.89 billion information records compromised. Five mega-breaches last year accounted for more than 72% of all data records exposed.
01/18/2018 – Main Street Cybersecurity: 10 Cost Effective Strategies for confronting Ransomware
Ransomware poses one of the most significant threats to small and medium size businesses across the nation. R2i has compiled these Top Ten Cost Effective Solutions for confronting ransomware.