Rapid7
Follow
312 Followers
Follow Rapid7 on their other social channels!
About Us
Founded:
2000
Company Size:
1001-5000 employees
Company Type:
Public
Location:
Boston, MA (HQ) / Global
Website:
Rapid7 (NASDAQ:RPD) powers the practice of SecOps by delivering shared visibility, analytics, and automation that unites security, IT, and DevOps teams. The Rapid7 Insight platform empowers these teams to jointly manage and reduce risk, detect and contain attackers, and analyze and optimize operatio ...
Read more
Promoted Content
30-Day Trial: UBA-Powered SIEM with Rapid7's InsightIDR
Follow
54
Staying Protected with Hardware Security Concepts
In this week’s Whiteboard Wednesday, Deral Heiland, Research Lead for IoT Technology, provides insight into how you can ensure your processors’ flash memory is protected against attacks. Learn the different hardware security concepts that will limit access to your processors and intellectual property from various entry points like GPIO, SPI, and JTAG.
Save
Like
02/10/2019
Follow
30
The Fail States of IoT
In this week’s Whiteboard Wednesday, Deral Heiland, Research Lead for IoT Technology, discusses the fail states of IoT. He explains the various fail states, including failure of an access point and failure of connectivity to an access point, as well as the risks to be on the lookout for when dealing with fail states. Learn about the warning signs and risks that occur when fail states aren’t taken care of.
Save
Like
02/10/2019
Follow
10
Checkmate: A Lesson in Vulnerability Management Strategy
The game of Chess originated in India around the 6th century AD. The purpose was believed to be for developing battle strategies, which is exactly what we do in cyber security. Chess helps improve mental abilities such as problem solving, critical thinking, pattern recognition, planning ahead, focus and concentration. This is the same mindset we strive for as IT professionals, specifically in vulnerability management. The vulnerability management goal is easy. It’s the surrounding problems, pa ...
Save
Like
02/09/2019
Follow
15
Closing the Loop: Detecting Vulnerabilities is Great, but Risk Only Decreases After Remediation
Patching is only effective if it is timely and thorough. But, timely and thorough patch management remains an elusive goal.We know about vulnerabilities and patches in general directly from vendor bulletins and from organizations like CERT and DHS. And our vulnerability scanners stridently report the specific systems missing these patches. Yet months go by and systems are still unpatched. Why is this?In this on-demand webinar, we will explore the answers to this question and the solutions. Here ...
Save
Like
02/09/2019
Follow
12
Vulnerability Management – Why Programs Fail and What You Can Do About It
Vulnerability Management should be at the core of every Information Security program (it’s CIS Control #3) and yet it is often one of the most misunderstood elements. Requiring strong leadership and many foundational elements to be successful, programs often topple because the legs of the table we have built are not sturdy to hold the weight of our scanning tools, and the data these tools produce.Join Rapid7’s Brian Carey for a discussion on some of the more common reasons Vulnerability Mana ...
Save
Like
02/09/2019
Follow
32
Rapid7 Industry Cyber-Exposure Report Highlights the Need for Vulnerability Management
In our recently released Industry Cyber-Exposure Report: Fortune 500, we uncovered that companies across all industries in the U.S. Fortune 500 are showing signs of recurring compromise. And if the resource-rich Fortune 500 is susceptible, it’s not difficult to imagine how bad it is for everyone else.Start identifying and remediating risk with a free trial of InsightVM today.Get StartedDid you remember to lock the door?According to the cyber-exposure report two fatal services ar ...
Save
Like
01/25/2019
Follow
21
SOC, SIEM, or MDR? How to Choose the Right Options for Your Infosec Program
It’s finally time. You’ve reached a tipping point and are ready to give your security organization the boost it needs—but there are so many options out there. Which is the best for your team? You could build an in-house security operations center (SOC), utilize a SIEM, or outsource to a managed detection and response (MDR) provider. It’s your job to figure out which one will ultimately benefit you and your team.In our latest webcast, we interviewed Charles Chasta ...
Save
Like
01/25/2019
Follow
28
What Does 2019 Have in Store for Cybersecurity?
Wondering what’s on the horizon for cybersecurity in 2019? Join our Rapid7 experts to learn more about the trends they’re tracking for 2019, what to keep an eye on, and what isn’t likely to happen (just yet).We'll be covering: Internet Embedded Technologies (IETs) and the role they’ll play in 20192019: The Year The 5 V's (Volume, Velocity, Variety, Veracity & Vulnerabilities) ConvergedLookin' at the Man in the Middle: How pervasive encryption & shared third party risk are putting ...
Save
Like
01/22/2019
Follow
44
How to Set Up Your Security Operations Center (SOC) for Success
Considering adding 24/7 SOC coverage to your incident detection and response programs? Experiencing challenges with operating your existing SOC? Building or selecting the right provider for a 24/7 incident detection and response (IDR) operation can be a daunting task. You want to make sure you’re getting the most from your investment—and that your analysts have the visibility, technology, and structure they need to perform. Whether you’re looking to add coverage or are experiencing challen ...
Save
Like
01/19/2019
Follow
28
Gartner Research: 10 Questions to Answer Before Adopting SaaS SIEM
If you need better visibility into your network, assets, and users, you are likely considering Security Information and Event Management (SIEM). A proper SIEM promises centralized log management, all-in-one threat detection and investigation, and even the ability to automatically contain threats found across user accounts and endpoints.What’s less exciting: hidden costs, complexity, and maintenance lurking beneath every successful, tuned data lake. This includes continuous hardware & data ...
Save
Like
01/19/2019

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel