Rapid7
Follow
326 Followers
Follow Rapid7 on their other social channels!
About Us
Founded:
2000
Company Size:
1001-5000 employees
Company Type:
Public
Location:
Boston, MA (HQ) / Global
Website:
Rapid7 (NASDAQ:RPD) powers the practice of SecOps by delivering shared visibility, analytics, and automation that unites security, IT, and DevOps teams. The Rapid7 Insight platform empowers these teams to jointly manage and reduce risk, detect and contain attackers, and analyze and optimize operatio ...
Read more
Promoted Content
30-Day Trial: UBA-Powered SIEM with Rapid7's InsightIDR
Follow
69
Rapid7 Incident Response Services
Get help improving your detection capabilities and incident response program—or let us take care of the whole thing for you.As a security professional, you’re charged with making attackers’ lives as miserable as possible. While continuously reducing your attack surface is a surefire way to get them shaking their fists, preventative measures are only intended to slow attackers down—if they want it badly enough, they’ll find a way into your network. To really bring the pain, organization ...
Save
Like
03/13/2019
Follow
69
Setting Your SOC up for Success
Considering adding 24/7 SOC coverage to your incident detection and response programs? Experiencing challenges with operating your existing SOC? Simply adding a SOC to your portfolio without adequate preparation is going to result in poor performance in threat detection, high turnover in valuable resources, and a general underperformance of a heavy financial investment.In order to get the most from your investment, SOC analysts require full visibility through the right technology, a well-defined ...
Save
Like
03/09/2019
Follow
78
Checking your Application Against the OWASP Top 10 Security Risks
Web application security is complex for a number of reasons. First of all, there's a wide variety of components involved, including browsers, web servers, and database servers. There’s potential for vulnerabilities every step of the way and bad guys often exploit subtle combinations of these technologies operating on different planes of execution. Take for instance SQL Injection. The vulnerability affects the database but the mitigation must be implemented in the server-side web application.So ...
Save
Like
03/09/2019
Follow
79
Is Your Organization Ready for Automation?
Today’s security and IT teams are struggling to keep up. The digital landscape is constantly changing and between disparate, unintegrated systems and repetitive, manual processes, security teams are having a difficult time getting ahead. There are too many alerts, not enough time to investigate them all, and staff are on the verge of burnout.Security orchestration and automation (SOAR) tools introduce ways for security teams to streamline and improve their everyday processes. But, is your orga ...
Save
Like
03/09/2019
Follow
81
The Secret to Attracting Top Security Talent (And Where to Find the Best Jobs!)
As organizations aggressively build out their security programs, the race for finding and retaining talent has become a top priority. While the global shortage of security practitioners is well known, all hope is not lost. Understanding what motivates top talent, what skills and qualities to look for, and where to find the best candidates for your organization’s needs can give you an edge.Join Rapid7 experts for an interactive discussion on what SOC hiring managers, security practitioners, and ...
Save
Like
03/08/2019
Follow
43
Rapid7 Quarterly Threat Report: 2018 Year in Review
The “threat landscape” is a moving, shifting form that will look different to different organizations—it all depends on where you are standing. Leveraging intelligence from Rapid7’s extensive network —including the Rapid7 Insight platform, Rapid7 Managed Services, Rapid7 Incident Response engagements, Project Sonar, Heisenberg Cloud, and the Metasploit community— the Rapid7 Quarterly Threat Report puts this shifting landscape into perspective.Join Rapid7 experts for a review of the k ...
Save
Like
03/02/2019
Follow
40
All-in on AppSec: The concepts, technologies, and approaches you need to know to start your program
Web applications have vulnerabilities—period, full stop. Most “AppSec” efforts focus on creating more secure applications, or attempt to deploy network appliances to protect those in production. The rapid growth of DevOps, microservices, and cloud deployments have made it more essential to secure apps before they get to production, and security software vendors seem to be introducing new, shiny solutions every month. But where do you start? What approach should you take?Join Rapid7’s app ...
Save
Like
03/02/2019
Follow
93
Staying Protected with Hardware Security Concepts
In this week’s Whiteboard Wednesday, Deral Heiland, Research Lead for IoT Technology, provides insight into how you can ensure your processors’ flash memory is protected against attacks. Learn the different hardware security concepts that will limit access to your processors and intellectual property from various entry points like GPIO, SPI, and JTAG.
Save
Like
02/10/2019
Follow
79
The Fail States of IoT
In this week’s Whiteboard Wednesday, Deral Heiland, Research Lead for IoT Technology, discusses the fail states of IoT. He explains the various fail states, including failure of an access point and failure of connectivity to an access point, as well as the risks to be on the lookout for when dealing with fail states. Learn about the warning signs and risks that occur when fail states aren’t taken care of.
Save
Like
02/10/2019
Follow
35
Checkmate: A Lesson in Vulnerability Management Strategy
The game of Chess originated in India around the 6th century AD. The purpose was believed to be for developing battle strategies, which is exactly what we do in cyber security. Chess helps improve mental abilities such as problem solving, critical thinking, pattern recognition, planning ahead, focus and concentration. This is the same mindset we strive for as IT professionals, specifically in vulnerability management. The vulnerability management goal is easy. It’s the surrounding problems, pa ...
Save
Like
02/09/2019

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel