Infographics

More Efficient Incident Detection and Investigation Saves $400,000 per Year, According to New IDC Data

More Efficient Incident Detection and Investigation Saves $400,000 per Year, According to New IDC Data

Measuring incident cost versus breach cost provides great business case for more efficient incident detection and response.

The Credit Card Criminal's Playbook

The Credit Card Criminal's Playbook

From initial entry to fraud, this timeline of a retail breach shows the steps criminals take to execute a retail data breach attack.

Nightmare on Pwn Street

Nightmare on Pwn Street

Ghouls and goblins abound in the security landscape, and organizations still fall victim to the same old tricks. Rapid7 investigated this spooky phenomenon, highlighting a number of threats that continue to get worse, not better.

Invasion of the Mobile Monster!

Growth of BYOD and Mobile Security

With BYOD growing, it is important to understand the risks involved with the bring your own device trend. Check out this infographic to learn more about BYOD and mobile security.

Life's a Breach: Yahoo Gets Burned by SQL Injection

Life's a Breach: Yahoo Gets Burned by SQL Injection

Rapid7 analyzed the details of 453,492 breached Yahoo! records and found that the majority of the published passwords were only "poor" or "weak" in strength due to a number of basic password security errors. In addition, over 100,000 Gmail accounts and thousands of Hotmail and AOL accounts may also have been compromised if users had reused their passwords across accounts. This infographic details other key findings from the analysis.

LinkedIn Passwords Lifted

LinkedIn Passwords Lifted

When 6.46 million LinkedIn password hashes were dumped in a Russian hacker forum, Rapid7 analyzed the first 165,000 cracked to see what password security lessons could be learned. The results reveal a worrying trend of people continuing to use obvious words or number sequences, which have by now become part of hackers' code-cracking algorithms. This infographic identifies the common mistakes to avoid in creating secure passwords.

IPv6 Enabled Systems Quadrupled Over the Past 3 Years

IPv6 Enabled Systems Quadrupled Over the Past 3 Years

While 10% of the world's top websites now offer IPv6 services, most companies haven't formulated an IPv6 strategy for the network. However, the issue is that most devices you have rolled out in the past 5 years have been IPv6-ready, if not IPv6-enabled.