Posts by Jane Man

2 min Breach Response News

Cyber security around the world - 11/2/14 - South Korea & Russia

With so much happening in cyber security around the world lately, we're going to start highlighting some of the interesting stories each week from across Europe, Middle East, Africa and Asia Pacific. This week, we're in South Korea and Russia. South Korea A couple of weeks ago, South Korea's Financial Services Commission (FSC) announced that over 20 million credit cards in the country had been compromised – the country's entire population is only 50 million. As a result, the FSC is stepping up

3 min

ControlsInsight Year In Review

While many are already looking ahead and making security predictions for 2014 [https://www.google.com/search?q=security+predictions+2014],  it's also important to pause and reflect on the year that's been. It's been a whirlwind year for ControlsInsight. We developed and launched a new product from the ground up - this in itself is an achievement that everyone involved should be proud of. Since launching in August, we've already released 7 product updates to quickly make improvements based on us

2 min

Honest advice from Rapid7's Chief Information Officer

In the 2013 Gartner CIO Agenda Report, over 2,000 CIOs were asked to rank their top technology priorities for 2013. Security was ranked at number 9 and, surprisingly, has remained static at this priority level for the past 5 annual surveys. Given that recent studies estimate that cyber-attacks are costing the U.S. economy $100 billion annually, why isn't security a higher priority for CIOs and how can security professionals change this? We know that these are top-of-mind questions for our custom

3 min CIS Controls

How ControlsInsight aligns to SANS 20 Critical Security Controls

During the development of ControlsInsight, we selected the first set of controls based on input from Rapid7 experts with extensive experience in attacker methodology (like HD Moore and our co-founders Tas Giakouminakis and Chad Loder) combined with industry best practices for risk mitigation. One of the best practices we used was the SANS 20 Critical Security Controls [http://www.sans.org/critical-security-controls/], which helps organization focus efforts on security controls that would have th

3 min Nexpose

Nexpose and ControlsInsight: Better Together

If you're currently using our vulnerability management software Nexpose, then you're probably already scanning your environment to identify, prioritize and remediate vulnerabilities and misconfigurations. But do you have visibility into the controls in place that mitigate these risks from being exploited? We recently launched a new product, ControlsInsight, that allows you to leverage your Nexpose deployment to automatically assess the effectiveness of your controls and get a complete picture of

1 min Nexpose

Nexpose and ControlsInsight: Better Together

If you're currently using our vulnerability management software Nexpose, then you're probably already scanning your environment to identify, prioritize and remediate vulnerabilities and misconfigurations. But do you have visibility into the controls in place that mitigate these risks from being exploited? We recently launched a new product, ControlsInsight, that allows you to leverage your Nexpose deployment to automatically assess the effectiveness of your controls and get a complete picture of

0 min

Looking for Centrics?

The product formally known as Centrics is now Rapid7 ControlsInsight. Underneath the hood it's still the same product but now the name is more self-explanatory; get insight into your controls effectiveness. Let us know what you think of the new name!

1 min

Introducing Rapid7 ControlsInsight

We're super excited to introduce Rapid7 ControlsInsight, a new security analytics and monitoring solution that helps you assess your defenses and create a plan to progress your endpoint security. Most organizations have made significant investments in security controls to defend against the real and current threats they face. However, few have true visibility into how broadly they've been deployed, how well they've been configured, and how effective they are at protecting the organization. Rapi