Security Management Resources

Learn how to make faster, smarter security decisions with our security management resources

These security management resources share best practices, guide you through successful implementations and help you understand the power of truly knowing your threat and risk posture.

Featured Content

Webcast

Password Resets, Credential Compromise, and OpenSSL: Shortening Heartbleed's Long Tail Impact

Many systems and environments saw usernames and passwords leaked by the Heartbleed attack. Love em or hate em, we know that users re-use passwords. Unlike major site compromises, password dumps, and public compromise notifications, very few organizations out there know whether or not their systems were hit, or what information was lost. Watch this webcast to learn how you can shorten Heartbleed's long tail impact within your organization.

Register For The Webcast
Whiteboard Wednesday

Cloud Security Monitoring: Why Monitoring Cloud Services Alone Isn’t Enough

In today’s Whiteboard Wednesday, Lital Asher-Dotan, Senior Product Marketing Manager, will talk about cloud security monitoring and why monitoring cloud services alone isn’t enough.

WATCH VIDEO

Latest Resources

Security Guide: How to Evade Anti-Virus Detection

Penetration testing can give you a clear view of the vulnerabilities that can easily be exploited within your environment; however, organizations need to be able to understand and test their users' behavior without anti-virus programs stopping these tests in their tracks. A great way to explore that user behavior is by deploying social engineering programs during a pen test. In this guide, penetration testers will learn how to evade anti-virus detection on target machines.

The Nexpose Expert System: Using an Expert System for Deeper Vulnerability Scanning

This paper explains how Rapid7 Nexpose uses an expert system to achieve better results in vulnerability scanning compared to traditional procedural methods. After a brief discussion of the product objectives and implementation, this paper explores the use of expert systems to achieve accurate and detailed vulnerability results.