Security Management Resources

Learn how to make faster, smarter security decisions with our security management resources

These security management resources share best practices, guide you through successful implementations and help you understand the power of truly knowing your threat and risk posture.

Featured Content


Party Crashers: How to Expose them & Show them the Door!

Attackers pivoted. We need to adapt. With an understanding of their motivations and methods, we are able to consider our own. Our path starts with a shift in mindset and a change in tactics - specifically what to look for in our network and how to respond. Join Michael Santarcangelo of Security Catalyst for the second part of the summer series

Whiteboard Wednesday

Security Compliance 101: Why Compliance Doesn't Equal Security

In today's Whiteboard Wednesday, Trey Ford, Global Security Strategist at Rapid7 will discuss compliance and how it should fit into your security program today.


Latest Resources

User-Based Attacks – The Kill Chain: From Compromising User Credentials to Exfiltrating Data

The Verizon Data Breach Investigations Report 2014 (DBIR) identifies stolen credentials as the number one most-used attacker method. Your users are under attack, or will be under attack, and in some cases, will become compromised one way or another. In this whitepaper, we’ve mapped common attacker behaviors to what we call "the user-based attacks kill chain." Download our whitepaper on the user-based attacks kill chain to arm yourself and your team with the knowledge you need to stop an attacker in their tracks.

Ten Tips for Detecting Malicious and Compromised Users

According to the Verizon Data Breach Investigations Report (DBIR) of 2014, compromised credentials are now the most commonly-used threat action. Stolen credentials were the most prevalent method for breaking into networks. At the same time, compromising user accounts via phishing and social engineering techniques was the third-most used attacker tool. As user-based attacks are now more common than ever, you must make detecting them a priority today. To help you build a robust user protection plan, we've assembled 10 tips.