Security Management Resources

Learn how to make faster, smarter security decisions with our security management resources

These security management resources share best practices, guide you through successful implementations and help you understand the power of truly knowing your threat and risk posture.

Featured Content


Heartbleed: A Post-Mortem Security Professional Discussion Panel

We are all sick of Heartbleed. It feels like the info sec song that wore out its welcome on the local radio station. By now, the vast majority of external facing systems and services have been inventoried and patched. Some, more reluctantly than others, have ordered new certificates, generated and pushed new SSL keys. Now that-s all done, we are building post mortem reports for executive management teams and boards, reflecting on our response to Heartbleed, and iterating and improving in preparation for the next incident.

Whiteboard Wednesday

Cloud Security Monitoring: Why Monitoring Cloud Services Alone Isn’t Enough

In today’s Whiteboard Wednesday, Lital Asher-Dotan, Senior Product Marketing Manager, will talk about cloud security monitoring and why monitoring cloud services alone isn’t enough.


Latest Resources

Security Guide: How to Evade Anti-Virus Detection

Penetration testing can give you a clear view of the vulnerabilities that can easily be exploited within your environment; however, organizations need to be able to understand and test their users' behavior without anti-virus programs stopping these tests in their tracks. A great way to explore that user behavior is by deploying social engineering programs during a pen test. In this guide, penetration testers will learn how to evade anti-virus detection on target machines.

The Nexpose Expert System: Using an Expert System for Deeper Vulnerability Scanning

This paper explains how Rapid7 Nexpose uses an expert system to achieve better results in vulnerability scanning compared to traditional procedural methods. After a brief discussion of the product objectives and implementation, this paper explores the use of expert systems to achieve accurate and detailed vulnerability results.