Blowing the hay away from the needles

The major problem companies around the globe have in common is that they focus their efforts in the wrong areas, not realizing the threats they face come from very simple security vulnerabilities. This is a global problem: All but the most security-focused of organizations are guilty of ignoring the simple issues. BRI has been designed to help you solve this problem.

BRI - Global Risk & Threat Intelligence

BRI is a Global Threat Intelligence, Risk Awareness and Early Warning Service, alerting you on ANY new risk potentially affecting your infrastructure, assets, staff, board, confidential data, and your organizations' reputation. Providing you with that precious awareness, knowledge and extra time to safeguard against and respond effectively to new threats your organization may be faced with.

The Security industry is full of news on threat intelli

The Security industry is full of news on threat intelligence (Log/ SIEM generated etc), but totally overlooks that the availability of proper RISK Intelligence may greatly diminish the volume of threat intelligence. That is why FORE-Warned is FORE-Armed; BRI warns you up-front of ANY possible risk that may hit YOUR Organization in the near future. More ahead in time and more comprehensive than any other available source. And yet, Siem systems identified advanced threat breaches less than 1% of the time.



The Benefits of Risk Intelligence

Risk Intelligence looks outside the organisation’s walls for relevant cyber activity trends facing similar types of organisations to better plan and prepare for impending threats to the business. This intelligence can provide the strategic insight necessary to direct resources and help guide internal tools and processes towards reducing an organisation’s cyber risk. Risk Intelligence helps you to PREVENT breaches and compromises in your organization.

You Can't Fix Security Flaws Unless You Know Them

24x7 Monitoring on any new risk that may threaten your organization. Fully customized to your organizations particular technology infrastructure, Industry, environment and specific requirements. Enabling you to mitigate or minimize potential risks and threats.
Pro-active in safeguarding your infrastructure, your data and your organizations reputation.

Identify Your Organization's Weak Points before Attacke

Identify Your Organization's Weak Points before Attackers do.
Breaches and attacks at Fortune 100 banks, retailers, and government agencies have shown that traditional measures like firewalls, IPSes and SIEMs are not enough. If you check every single major breach recorded over the past few years, every single victim was already using next-generation firewalls, intrusion protection systems, anti-malware sandboxing technology.


Breaches often happen because security personnel and their executives become complacent, and rules, policies and procedures aren’t followed.................................................................PREVENT instead of having to DEFEND

Risks and Costs

There are risks and costs to a program of action—but they are far less than the long range cost of comfortable inaction.

John F. Kennedy

Over a million risk-alerts in the Brica database

On average 500-600 new risk items and alerts each day. Well over 3500 each week. Close to 75,000 alerts this year sofar.

Do something

Do something and don’t stop until it’s complete, no matter how long it takes.

deeply fulfilling

There is something deeply fulfilling — even thrilling — in doing almost anything difficult extremely well. There is a joy and pride that come from pushing yourself to another level or across a new frontier. A life devoted only to the present — to feeling good in the now — is unlikely to deliver real fulfillment.


Having perseverance, resiliency, passion, drive, ambition, and the unstoppable, unwavering willpower to achieve an intended goal. It is the ability to cope with and overcome obstacles, hurdles, doors slammed in your face, rudeness, indifference, dead ends, lack of feedback and everything else that the universe throws at you to block your forward momentum.


The ability to perform deep work is becoming increasingly rare at exactly the same time it is becoming increasingly valuable in our economy. As a consequence, the few who cultivate this skill, and then make it the core of their working life, will thrive.

To Be Ready for the Security Future, Pay Attention to t

The past should be neither ignored nor forgotten, especially in cybersecurity. However, security teams can easily overlook the past if it is not prioritized because of the rapid nature of the job. To stay one step ahead of hackers, find ways to use the past to better inform the present and secure a better future.

At every crossroad

At every crossroad on the road that leads to the future, each progressive spirit is opposed by a thousand men assigned to guard the past.

Maurice Maeterlinck, Belgium poet, Nobelprice winner Literature 1911

Inconvenient truth...

"Give a man an 0day and he'll have access for a day, teach a man to phish and he'll have access for life."

- @thegrugq

Business Risk Intelligence & Cyberthreat Awareness

Your complete one-stop resource for Relevant, Focused, Timely and Actionable Risk Intelligence.

Business Risk Intelligence allows you to assume a more strategic position in the war against cybercrime. This enables you to better understand the threatscape, including expected attack trends and threat exposure. Resulting in recognizing attacks before they are happening in real-time and identifying new threats the moment they emerge.

Some cross-section samples of our latest Red alerts

Apache Tomcat APR/native Connector vulnerabilities
14 minutes ago
US - Maine college says malware may have exposed personal data
12 hours, 12 minutes ago
Recall - Torrent Pharmaceuticals Limited Issues Voluntary Nationwide Recall of Valsartan / Amlodipine / HCTZ Tablets
12 hours, 17 minutes ago
Apache Security Update that Covers Multiple Vulnerabilities With Tomcat Native
12 hours, 23 minutes ago
Trickbot Malware Re-emerging via MS Word Documents with Powerful Code-Injection Technique
14 hours, 35 minutes ago
Hijacker v1.3 – A Complete Wi-Fi Hacking Tool Kit for Android
14 hours, 55 minutes ago
K54431371: BIG-IP APM client for Linux and macOS vulnerabilitiy CVE-2018-5546
15 hours, 10 minutes ago
K10015187: BIG-IP APM client for Windows vulnerability CVE-2018-5547
15 hours, 11 minutes ago
Malspam Campaign Targets Banks Using Microsoft Publisher
15 hours, 36 minutes ago
Information Leak - Github - JMS Information
16 hours, 32 minutes ago
Storm Alert - Typhoon SOULIK, Japan
16 hours, 59 minutes ago
DSA-4277-1 mutt -- security update
17 hours, 34 minutes ago
For a full list of alerts please fill in the registration form to sign up for a two-week trial.
Login to your Account

For more information, fill out this form and we'll contact you as soon as possible.

Or email ​