The Risk Score is a dynamic metric ranging from 0 to 100 that quantifies your organization's External Attack Surface Risk with precision. It moves beyond simple vulnerability counting to measure the specific depth of actionable intelligence currently available to adversaries for planning and executing an attack. The governing principle is visibility, as the exposure of your assets, credentials, and vulnerabilities increases, the barrier to entry for a successful breach significantly decreases. By illuminating your infrastructure through an adversarial lens, the Risk Score transforms abstract threats into a clear indicator of breach probability, providing the critical context needed to anticipate and neutralize attacks before they occur.
This system transforms complex, fragmented threat data—from active malware and stolen credentials to critical vulnerabilities—into a single, easy-to-understand metric. By synthesizing these critical signals, the Risk Score empowers your organization with strategic decision-making to prioritize resources effectively, shifting focus from general monitoring to targeted, data-driven remediation of the most critical exposures.
The score places your organization into one of five categories. This classification helps you immediately understand the urgency of your situation and the resources required for remediation.
| Score Range | Category | Operational Implication | Recommended Response |
| 0-19 | CRITICAL | Immediate Danger. This score indicates the presence of active threats, such as malware infections actively harvesting data. Access to your network is highly probable. | Emergency Response. Escalate immediately. Focus resources on isolating infected devices and resetting compromised credentials to sever attacker access. |
| 20-39 | HIGH | Serious Exposure. Your attack surface is highly visible, with clear exploitation paths available through unpatched systems or leaked credentials. | Prioritize Remediation. Allocate immediate resources to patch high-risk vulnerabilities and secure exposed accounts to reduce the attack surface. |
| 40-59 | MEDIUM | Moderate Risk. While not immediately critical, gaps in your defense exist. These weaknesses degrade your security posture and offer potential entry points if left unaddressed. | Plan Remediation. Integrate fixes into your regular maintenance cycles. Review infrastructure hygiene to close non-critical gaps. |
| 60-79 | LOW | Minor Exposure. Your organization maintains a relatively secure posture with limited actionable intelligence available to attackers. | Routine Monitoring. Continue addressing minor issues as they arise within standard operational cycles. |
| 80-100 | MINIMAL | Optimal Posture. Your external footprint is minimized, making your organization a hard target for adversaries. | Maintain. Sustain current monitoring and security practices to ensure continued protection. |
The score is an aggregation of five specialized indices. Each index measures a specific type of threat, weighted by how critical it is to your security.
The Risk Score incorporates a Time Decay mechanism to ensure the score reflects your current threat landscape rather than historical data. Based on how time-sensitive a threat is, they will be qualified in the following Decay Factors:
The scoring system also applies different temporal logic depending on the nature of the data being analyzed classifying it as Dynamic and Static Risk.
| Index Name | Weight | Description | Decay Factor |
| Stealer Index | 40% | It tracks active infostealer malware on devices associated with your users that are harvesting data like passwords and cookies. This is the most critical threat because stolen credentials provide adversaries with authorized, direct access to your systems. | Heavy |
| Vulnerability Index | 20% | Tracks known security weaknesses (CVEs) in your internet-facing systems, such as unpatched software or outdated infrastructure. These serve as open windows or exploits that attackers can use to break into your network. | Moderate |
| Infrastructure Index | 20% | Measure the complexity and hygiene of your external network, including risky open ports, subdomain sprawl, and asset dispersion. A complex, disorganized attack surface creates more hiding spots and entry points. | - |
| Exposure Index | 15% | Looks for corporate credentials (emails and passwords) found in public data breaches and leaks. Adversaries use these lists for credential stuffing attacks to take over accounts. | Heavy |
| Typosquatting Index | 5% | Find fraudulent domains that mimic your brand (e.g., my-company.com vs mycompany.com). These domains are used primarily for phishing attacks against your employees and customers. | - |
To lower your risk score effectively, prioritize your actions based on index weights and leverage automated response tools where available: