Attack vs data: What you need to know about threat hunting
In order to optimise an offensive approach like threat hunting, it helps to first know the granular ins and outs of your IT/security stacks.
Rapid7 named Gartner leader
The company was positioned as a leader in the Gartner 2020 Magic Quadrant for SIEM.
Rapid7 impresses Forrester
The company was recognised as a leader in Forrester's Vulnerability Risk Management report.
Rapid7 acquires Komand
It has acquired the security orchestration and automation company, Komand, to help its customers reduce time to resolution and maximise resources.
Newly discovered vulnerability ups WannaCry fears
A newly found flaw in widely used networking software leaves tens of thousands of PCs vulnerable to an attack similar to WannaCry.
It takes almost five months to detect, contain a threat
It gives attackers over 142 days to look at your information, says Rapid7.
Security Summit: Know when, how to use threat intelligence
Threat intelligence is analysed information about the capability, intent and opportunities of cyber threats, says Rapid7's Rebekah Brown.
Turning data into threat intelligence
Intelligence can support incident detection, incident response, training and awareness, security architecture, and many other aspects of a security programme, says Rapid7.
Understand your network and security requirements
It's important to understand your network, your organisation and your business processes in order to fight cyber threats, says Rapid7's Craig Everson.
Users the weakest link in security chain
The vast array of user-based attacks make them hard to prevent, so early detection is important, says Rapid7's Craig Everson.
Preventing user-based attacks
Mitigating user-based attacks requires a combination of prevention and detection technologies, says Rapid7.