cookie settings at any time, however disabling cookies may prevent you from using parts of our website. More about Rapid7's Privacy & Cookies Policy.
Learn how to make faster, smarter security decisions with our security management resources
These security management resources share best practices, guide you through successful implementations and help you understand the power of truly knowing your threat and risk posture.
Verified! A Best Practice Framework for Vulnerability Prioritization
There are so many vulnerabilities constantly appearing that it-s daunting for security professionals to decide which ones should be tackled first. How do you decide which vulnerabilities really matter? Are you focusing on vulnerabilities that can actually be exploited and don-t have compensating controls in place?
Join Nate Crampton, Product Marketing Manager at Rapid7, and Ethan Goldstein, Security Solutions Engineer, to learn how solutions like Nexpose for vulnerability management and Metasploit for vulnerability verification work together to help prioritize vulnerabilities that put your organization at risk and help you get buy-in from IT on urgent security issues.
PCI Compliance 101 - What is PCI Compliance, and How Do I Become PCI Compliant?
In this Whiteboard Wednesday, Ethan Goldstein explains what PCI is, how to become PCI compliant, and what you should look for in a vendor. Whether you are searching for a PCI approved scanning vendor or simply trying to answer the question, "What is PCI compliance?" Rapid7 can help! Watch this video to get started.
It seems like we've been hearing a lot about phishing in the news in recent years, and this threat hasn't abated yet. Why are attacks via phishing -and social engineering in general -so prevalent and so effective? This whitepaper examines the many different methods employed in phishing attacks and social engineering campaigns, and offers a solution-based approach to mitigating risk from these attack vectors.
For the 3rd Consecutive year, Rapid7 rates "Strong positive" - the highest possible rating. Find out how Vulnerability Assessment solutions can benefit you and why Gartner gives Rapid7 Nexpose top marks.
Negative media coverage, a loss of customer confidence, and the resulting loss in sales can cripple a business. As a result, all entities that handle credit cardholder information are being challenged to adopt more effective data protection measures. The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.
When private medical records are breached, healthcare service providers suffer damage to their brand, reputation, loss of trust from their patients, and severe financial repercussions. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandates that appropriate administrative, technical, and physical safeguards be used to protect the privacy and security of sensitive health information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving HIPAA compliance.
Justin Kennedy, Principal Security Consultant at Integralis, explains why Integralis chose Rapid7's Nexpose and Metasploit for their security needs. Integralis has been a Rapid7 customer since 2009, and they made the choice to use Rapid7 thanks to outstanding customer support and engagement, as well as robust product features that help him do his job more easily and efficiently. For example, Justin cites Metasploit's social engineering capabilities as a feature that puts Rapid7 ahead of the pack.
Rapid7 analyzed the details of 453,492 breached Yahoo! records and found that the majority of the published passwords were only "poor" or "weak" in strength due to a number of basic password security errors. In addition, over 100,000 Gmail accounts and thousands of Hotmail and AOL accounts may also have been compromised if users had reused their passwords across accounts. This infographic details other key findings from the analysis.
In this product brief learn how Mobilisafe's key features and approach make it the ideal mobile security solution for BYOD. Detailed descriptions of Mobilisafe's key features and design architecture are included.
This data sheet provides a general overview of Rapid7 Nexpose. It describes the product's core functionality and explores how Rapid7 customers leverage Nexpose to conduct unified vunerability management.
Read this review of Rapid7 Nexpose to understand why Peter Stephenson of SC Magazine said the product "is a feature-packed vulnerability assessment and risk analysis tool that always goes beyond expectations.
West Coast Labs engineers set up a test network with multiple operating systems running at different patch levels,with each of these machines having many security flaws and vulnerabilities in order to replicate the heterogeneous nature of many corporate networks. Read their report to understand how Rapid7 Nexpose was tested and how it succeeded in achieving the Check Mark Certification.
Aggregated views across an organization help quickly assess the number of mobile users, devices, operating systems and their configurations. In this video, see how this information is presented via the Mobilisafe dashboard.
This whitepaper details research conducted by Rapid7, which reveals that around 40-50 million network-enabled devices are at risk due to vulnerabilities found in the Universal Plug and Play (UPnP) protocol. UPnP enables devices such as routers, printers, network-attached storage (NAS), media players and smart TVs to communicate with each other. The paper investigates how three groups of security flaws relating to the UPnP protocol are exposing millions of users to attacks that could lead to a remote compromise of the vulnerable device.
Rapid7, the leading provider of security risk intelligence solutions, analyzed data collected and categorized by the Privacy Rights Clearinghouse Chronology of Data Breaches. Using this data, the company outlined patterns for government data breaches, including year, month, location and breach type patterns. This information and tips for protecting infrastructure can ensure that government IT environments stay protected against malicious attacks and unintended disclosure.