Rapid7
Follow
238 Followers
Follow Rapid7 on their other social channels!
About Us
Founded:
2000
Company Size:
501-1000 employees
Company Type:
Public
Location:
Boston, MA (HQ) / Global
Website:
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized an ...
Read more
Promoted Content
Start Your InsightAppSec Free Trial and Get Full Functionality for 30 Days
Follow
20
GDPR Toolkit: Building an Incident Response Plan to Support GDPR
Download our toolkit focused on building an incident response program to support your GDPR efforts.The General Data Protection Regulation requires organizations to report personal data breaches within 72 hours of discovery. Breach reporting doesn't start and end at sending a notification - great incident response tools, processes and expertise have never been more important.  Whether you have a state of the art security operations center and a plethora of IR playbooks, or you're just g ...
Follow
32
7 Best Practices for Cybersecurity
Cyber-attacks are on the rise, as more companies undergo digital transformation and customers demand easier and more convenient access to information and services. With these changing demands, the risks for companies responsible for data security continue to increase and focusing exclusively on preventing breaches is no longer enough. In order to create an effective cybersecurity program, detecting active compromises inside IT environments as part of an incident detection and response progr ...
Follow
36
Incorporating Automated Actions Into Your Vulnerability Management Process
In today’s security climate, we all want to know that our data is as current as possible. Often, customers will increase their vulnerability scanning frequency to weekly or even daily to meet the needs of an ever-changing environment. However, this requires a lot of resources and generates tons of data while making it difficult to identify only what has changed.This is exactly why we developed automated actions within InsightVM, Rapid7’s vulnerability management solution! ...
Follow
30
Smart Sensors: Our Bold New World
Over the last several months I have been surveying our bold new world of smart sensor technology. It is absolutely amazing how advances in this area over the last decade have led to technology that affects our day-to-day lives on a large scale. For example:Buildings and bridges are equipped with architectural sensors to detect movement, cracks, and fatigue.Industrial motors and equipment have tracking sensors for failure analysis and performance monitoring.Environmental smart sensors monitor for ...
Follow
27
Rapid7 InsightPhish (Beta): Unified phishing simulation, investigation, and analysis
Phishing attacks remain one of the top challenges for SecOps teams. Yes, we all nod when we see the stats that get thrown around, like the ones below. But we also know this because we’ve heard it directly from our customers. Rapid7 has a long tradition of creating products and functionality inspired by our customers, and when we see a pain you are experiencing, we strive to make your life easier.This is the origin story of our latest solution, Rapid7 InsightPhish, now available in be ...
Follow
29
Prepare for Battle: Let’s Build an Incident Response Plan (Part 2)
Part 2: Reviewing The Incident Response PlanIn our first part of this series, we covered key considerations when drafting an incident response (IR) plan. Today, let’s cover what plan review looks like and the best way to get buy-in from key stakeholders in the company. Collaborative study helps ensure that all involved parties—including those not in security—understand their roles over the course of an incident.Prepare Each Player for Incident ResponseAn effective incident respon ...
Follow
229
The 4 Big Differences Between Network Security and Web Application Security
Tomato, tomato, potato, potato, network security and web application security. Two things that may seem similar, they are actually quite different. Network security (also known as vulnerability assessment or vulnerability management) has been around for quite some time and is something most security practitioners today know well. Web application security, however, is still not widely understood and has many scratching their heads.While both seek out weaknesses in a company’s security ...
Follow
29
Prepare for Battle: Let’s Build an Incident Response Plan (Part 1)
Part 1: Drafting the PlanAny organization that interfaces with sensitive data needs to detect and respond to security incidents. Turning to an outside party only during a critical time of need is a risky strategy. Creating and testing an incident response (IR) plan will mitigate risk: Help your organization perform at its best by preparing it for the worst.An incident response plan serves as your master blueprint when navigating the challenges of a serious infosec incident. I ...
Follow
32
Incorporating Automated Actions Into Your Vulnerability Management Process
In today’s security climate, we all want to know that our data is as current as possible. Often, customers will increase their vulnerability scanning frequency to weekly or even daily to meet the needs of an ever-changing environment. However, this requires a lot of resources and generates tons of data while making it difficult to identify only what has changed.This is exactly why we developed automated actions within InsightVM, Rapid7’s vulnerability management solution! ...
Follow
46
Vulnerability Management Toolkit: The Best of 2017
As technologies continue to evolve, there’s no shortage of vulnerabilities to manage and remediate (2017 was no better illustration of our point). But this isn’t the time to accept exploitation as the inevitable; staying informed, attentive, and well-read makes a world of difference in how your security program will fare against the big, the bad, and the ugly.That said, we’ve compiled this toolkit, in which you will find our most downloaded vulnerability management resources of the year (o ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel