Rapid7
Follow
259 Followers
Follow Rapid7 on their other social channels!
About Us
Founded:
2000
Company Size:
501-1000 employees
Company Type:
Public
Location:
Boston, MA (HQ) / Global
Website:
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized an ...
Read more
Promoted Content
Start Your InsightIDR Free Trial and Get Full Functionality for 30 Days
Follow
27
Whiteboard Wednesday: Moving Left in the SDLC
In this week’s Whiteboard Wednesday, Mark Hamill, Senior Product Manager for Application Security Products, outlines why businesses can no longer afford for web application security to be the responsibility of a single team, rather than a shared initiative across security, IT operations, and development teams. The secret to running both quickly and securely? Shifting the responsibility of application security left in the software development lifecycle (SDLC).Want to learn how to star ...
Follow
262
Prepare for GDPR Compliance with Rapid7's Toolkit
What is the GDPR?The General Data Protection Regulation (GDPR compliance) protects the personal data of EU citizens. If your company handles the personal data of EU citizens, regardless of where you are based in the world, you’ll need to take some important steps to ensure that data is correctly controlled, processed, maintained, retained, and secured. With penalties as steep as €20,000,000 or 4% of your annual gross revenue (whichever is higher), this should be a top priority for your team ...
Follow
141
A Step-by-Step Guide to Shifting Left and Embracing a True DevSecOps Mentality
A major shift in application security is underway...There is a major shift happening right now. It's not just affecting security teams, but IT operations and development teams, too. And it's something no company can afford to ignore today. It's the shift from web application security being the job of the security team to it being a shared initiative across many teams.In this whitepaper, we outline why the solution to staying fast, staying competitive, and staying secure is shifting the responsib ...
Follow
27
Mind the Gap: Going beyond penetration testing for security improvement
Security teams and leaders know the value of regular external and internal testing of technical controls for their organization's security program, but what about the other stuff? Subjects like IT security management, threat modeling, incident response and security architecture improvement aren't usually addressed in most penetration tests, and compliance driven audit processes rarely extend beyond the regulation or standard that is being audited. During this presentation, Caspian Kilkelly, seni ...
Follow
50
Rapid7's Quarterly Threat Report: Q4 and 2017 Wrap-Up
The Wild Ride That Was 2017:Industry selfies, EternalBlue, and what's aheadThe past year was seemingly as far from "business as usual" as we could have imagined. Having visibility into the right data and event sources was a key theme throughout the year, and we'd be remiss if we didn't emphasize the role the Shadow Brokers dump had from April onward. For the final Quarterly Threat Report of 2017, we wrap up the year with:Workday patterns in incident frequencyThreats facing the real estate a ...
Follow
89
The Forrester Wave™: Vulnerability Risk Management, Q1 2018: InsightVM positioned as a leader amongst VRM vendors
In their 2018 Wave for vulnerability risk management (VRM), Forrester writes that Rapid7 “has already implemented what VRM will look like in the future”; the evaluation gave Rapid7 the highest score in the Current Offering and Strategy categories, and the highest score possible in the Market Presence category. We believe that this indicates that Rapid7 InsightVM is a powerful solution for helping customers meet their vulnerability management goals—now and in the fu ...
Follow
37
How to Phish Your Business (And Get Management's Buy-In)
What we know:Phishing and related social engineering techniques targeting users are linked to more successful data breaches than any other form of cyberattack.It is impossible to prevent phishing attempts by purely technical means.A phishing awareness program can dramatically reduce the success rates of phishing attempts.Just one problem—the members of your management team probably don’t know much about what a phishing awareness program is, or why it’s important. So how do you ge ...
Follow
180
Prepare for Battle: Building an Incident Response Plan
In this age of rapidly evolving IT and emerging cyber threats, any organization that interfaces with sensitive data needs to detect and respond quickly to security incidents. Laying a foundation for threat response allows IT organizations and their partners to respond to incidents as effectively and efficiently as possible. That’s where an incident response plan comes in: to help your organization perform at its best by preparing for the worst.In this four-part eBook, we’ll walk through:Draf ...
Follow
96
Keys from the Analysts: Implementing Successful IDR & MDR Deployments
Download our IDR & MDR Toolkit, Featuring Insight from GartnerOrganizations are looking to improve real-time threat detection and incident response capabilities. However, implementing a SIEM solution is one of the most challenging projects for security and IT teams. Before deciding what SIEM solution is best for your organization, it is important to consider all of your options and requirements. For example, would a managed detection and response solution be the better choice? We've compiled ...
Follow
52
The Clock Is Ticking on GDPR
GDPR is right around the corner and currently shaking the international cybersecurity community. Technology and legal experts say it will take the average company one to two years to become compliant, and with May 25th just months away it is pertinent to be in the know with anything concerning this compliance. Join to see what Sam Humphries, Senior Manager at Rapid7, has to say on the topic. You will learn:How your company is affected by this compliance (even if you are US based)Penalties U ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

HoneyBOT
Views: 373 / April 21, 2018
Protect Your PC from Attack in 4 Steps
Views: 371 / April 21, 2018
Advanced PDS: OST to PST Converter Solution
Views: 225 / April 21, 2018
XFS File System – RHEL7
Views: 957 / April 20, 2018
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel