2 min
InsightVM
Vulnerability Management: A Year in Review - Prioritize
2017 has already broken the record
[https://www.darkreading.com/threat-intelligence/2017-has-broken-the-record-for-security-vulnerabilities/d/d-id/1330410?]
for the most number of vulnerabilities reported. With more software being
produced and more researchers focused on finding vulnerabilities, this trend
will probably continue. Understanding where to focus and which vulnerabilities
to fix first is more important than ever. That’s why this year we delivered
several innovations within our vulne
3 min
Threat Intel
Live Threat-Driven Vulnerability Prioritization
We often hear that security teams are overwhelmed by the number of
vulnerabilities
[https://www.rapid7.com/fundamentals/vulnerabilities-exploits-threats/] in their
environments: every day they are finding more than they can fix. It doesn't help
when rating schemes used for prioritization, like the Common Vulnerability
Scoring System (CVSS), don't really work at scale or take the threat landscape
into account. How do you know where to focus if your vulnerability management
solution [https://www.
2 min
Nexpose
New and Improved Policy Manager
This year we've made many enhancements to the configuration policy assessment
capabilities in Nexpose, including adding 4 new reports
[/2016/07/05/getting-more-out-of-nexpose-policy-reports] and NIST 800-53
controls mapping [/2016/08/11/nist-800-53-control-mappings-in-sql-query-export].
Last week we unveiled a new and improved user interface for the Policy Manager,
providing you with more information on your compliance position at your
fingertips.
With the new interface, you can quickly see how
2 min
Nexpose
Live Monitoring with Endpoint Agents
At the beginning of summer, we announced some major enhancements
[https://www.rapid7.com/products/nexpose/now.jsp] to Nexpose including Live
Monitoring, Threat Exposure Analytics, and Liveboards, powered by the Insight
Platform [https://www.rapid7.com/trust/]. These capabilities help organizations
using our vulnerability management
[https://www.rapid7.com/solutions/vulnerability-management.jsp?CS=blog] solution
to spot changes as it happens and prioritize risks for remediation.
We've also been
2 min
Nexpose
Vulnerability Remediation with Nexpose
At the beginning of summer, we announced some major enhancements
[https://www.rapid7.com/products/nexpose/now.jsp?CS=blog] to Nexpose
[https://www.rapid7.com/products/nexpose/?CS=blog] including Live Monitoring,
Threat Exposure Analytics, and Liveboards, powered by the Insight Platform
[https://www.rapid7.com/trust/?CS=blog]. These capabilities help organizations
using our vulnerability management
[https://www.rapid7.com/solutions/vulnerability-management.jsp?CS=blog] solution
to spot changes as
2 min
Nexpose
Getting More Out of Nexpose Policy Reports
Auditing your systems for compliance with secure configuration policies like
CIS, DISA STIGs, and USBCG is an important part of any effective security
program, not to mention a requirement for many industry and regulatory
compliances like PCI, DSS, and FISMA. With Nexpose, you can automate this
assessment using our Policy Manager feature.
Back in March we launched two brand new policy report templates, Policy Rule
Breakdown Summary and Top Policy Remediations, to help organizations understand
h
2 min
Events
BlackHat Europe 2014: Printers, Lasers, and Drones! Oh My!
If you've even been to the BlackHat conference in Vegas, then the European
version is kind of like that except much, much… much smaller. Did I mention it
was much smaller? The business hall consisted of about dozen vendors including
Rapid7. We spent two days at the Amsterdam RAI giving away almost 500 Metasploit
t-shirts, and one pair of bright orange Beatz headphones
[https://twitter.com/secrgb/status/523077059703476224]. What I did notice about
BlackHat Europe is the diversity of the 1000 plus
1 min
Cyber security around the world - 7/4/14 - Germany
With so much happening in cyber security around the world lately, we're
highlighting some of the interesting stories each week from across Europe,
Middle East, Africa and Asia Pacific. This week we're in Germany where officials
have found the second mass user account hacking this year…
Germany
Last week German officials confirmed that 18 million email address and
passwords
were hacked
[http://www.dw.de/german-officials-confirm-18-million-emails-and-passwords-stolen/a-17542815]
in a mass dat
2 min
Cyber security around the world - 1/4/14 - Australian Privacy Principles
With so much happening in cyber security around the world lately, we're
highlighting some of the interesting stories each week from across Europe,
Middle East, Africa and Asia Pacific. This week, we're in Australia to see
what's happening with changes to privacy laws...
Australia
On March 12th, the Australian Privacy Principles (APP)
[http://www.oaic.gov.au/privacy/privacy-resources/privacy-fact-sheets/other/privacy-fact-sheet-17-australian-privacy-principles]
came into effect, giving priva
2 min
Incident Response
Cyber security around the world - 18/3/14 - UK Cyber Security Strategy
With so much happening in cyber security around the world lately, we're
highlighting some of the interesting stories each week from across Europe,
Middle East, Africa and Asia Pacific. This week, we're in the UK to look at a
key component of the government's Cyber Security Strategy
[https://www.gov.uk/government/publications/cyber-security-strategy]…
United Kingdom
Over a year ago, the UK government announced plans for a new national Computer
Emergency Response Team (CERT)
[https://www.gov.u
2 min
Cyber security around the world - 10/3/14 - India
With so much happening in cyber security around the world lately, we're
highlighting some of the interesting stories each week from across Europe,
Middle East, Africa and Asia Pacific. This week, we're in India (via China)…
India
“No Internet safety means no national security,” said Chinese President Xi
Jinping, after announcing a new working group on cyber security
[http://www.nytimes.com/2014/02/28/world/asia/china-announces-new-cybersecurity-push.html?_r=0]
. This statement rings particul
2 min
Security Strategy
Cyber security around the world - 3/3/14 - Germany & Australia
With so much happening in cyber security around the world lately, we're
highlighting some of the interesting stories each week from across Europe,
Middle East, Africa and Asia Pacific. This week, we're in Germany and Australia…
Germany
The news last month that Facebook bought WhatsApp for $19 billion has
highlighted the importance of data privacy for users, particularly in Germany. A
day after the deal was announced, Swiss messaging app Threema doubled its user
base and rose to the top
[http
2 min
Authentication
Cyber security around the world - 17/2/14 - UK & Singapore
With so much happening in cyber security around the world lately, we're
highlighting some of the interesting stories each week from across Europe,
Middle East, Africa and Asia Pacific. This week, we're in United Kingdom and
Singapore…
United Kingdom
A few weeks ago, Tony Neate, CEO of the UK Government's Get Safe Online
initiative, state that any password is better than no password at all, even if
it's as simple as “abc123”
[http://www.theguardian.com/technology/2014/jan/20/uk-cyber-security-
3 min
ControlsInsight Year In Review
While many are already looking ahead and making security predictions for 2014
[https://www.google.com/search?q=security+predictions+2014], it's also
important to pause and reflect on the year that's been. It's been a whirlwind
year for ControlsInsight. We developed and launched a new product from the
ground up - this in itself is an achievement that everyone involved should be
proud of.
Since launching in August, we've already released 7 product updates to quickly
make improvements based on us
2 min
Honest advice from Rapid7's Chief Information Officer
In the 2013 Gartner CIO Agenda Report, over 2,000 CIOs were asked to rank their
top technology priorities for 2013. Security was ranked at number 9 and,
surprisingly, has remained static at this priority level for the past 5 annual
surveys. Given that recent studies estimate that cyber-attacks are costing the
U.S. economy $100 billion annually, why isn't security a higher priority for
CIOs and how can security professionals change this? We know that these are
top-of-mind questions for our custom