Jen Ellis's picture

Posts by Jen Ellis

A Year on from the Ransomware Task Force Report

Industry Trends

A Year on from the Ransomware Task Force Report

Jen Ellis's avatar

Jen Ellis

The Digital Citizen’s Guide to Navigating Cyber Conflict

Industry Trends

The Digital Citizen’s Guide to Navigating Cyber Conflict

Jen Ellis's avatar

Jen Ellis

Ransomware: Is Critical Infrastructure in the Clear?

Industry Trends

Ransomware: Is Critical Infrastructure in the Clear?

Jen Ellis's avatar

Jen Ellis

Reforming the UK’s Computer Misuse Act

Industry Trends

Reforming the UK’s Computer Misuse Act

Jen Ellis's avatar

Jen Ellis

Hack Back Is Still Wack

Exposure Management

Hack Back Is Still Wack

Jen Ellis's avatar

Jen Ellis

The Ransomware Task Force: A New Approach to Fighting Ransomware

Exposure Management

The Ransomware Task Force: A New Approach to Fighting Ransomware

Jen Ellis's avatar

Jen Ellis

Decrypter FOMO No Mo’: Five Years of the No More Ransom Project

Industry Trends

Decrypter FOMO No Mo’: Five Years of the No More Ransom Project

Jen Ellis's avatar

Jen Ellis

Internet of Things Cybersecurity Regulation and Rapid7

Detection and Response

Internet of Things Cybersecurity Regulation and Rapid7

Jen Ellis's avatar

Jen Ellis

The IoT Cybersecurity Improvement Act of 2019

Detection and Response

The IoT Cybersecurity Improvement Act of 2019

Jen Ellis's avatar

Jen Ellis

Patching CVE-2017-7494 in Samba: It's the Circle of Life

Vulnerabilities and Exploits

Patching CVE-2017-7494 in Samba: It's the Circle of Life

Jen Ellis's avatar

Jen Ellis

Vulnerability Disclosure and Handling Surveys - Really, What's the Point?

Exposure Management

Vulnerability Disclosure and Handling Surveys - Really, What's the Point?

Jen Ellis's avatar

Jen Ellis

12 Days of HaXmas: Rapid7 Gives to You... Free Professional Media Training (Pear Tree Not Included)

Exposure Management

12 Days of HaXmas: Rapid7 Gives to You... Free Professional Media Training (Pear Tree Not Included)

Jen Ellis's avatar

Jen Ellis

New DMCA Exemption is a Positive Step for Security Researchers

Industry Trends

New DMCA Exemption is a Positive Step for Security Researchers

Jen Ellis's avatar

Jen Ellis

Rapid7's Comments on the Wassenaar Arrangement Proposed Rule

Industry Trends

Rapid7's Comments on the Wassenaar Arrangement Proposed Rule

Jen Ellis's avatar

Jen Ellis

Wassenaar Arrangement - Frequently Asked Questions

Industry Trends

Wassenaar Arrangement - Frequently Asked Questions

Jen Ellis's avatar

Jen Ellis

GHOST in the Machine - Is CVE-2015-0235 another Heartbleed?

Vulnerabilities and Exploits

GHOST in the Machine - Is CVE-2015-0235 another Heartbleed?

Jen Ellis's avatar

Jen Ellis

POODLE Unleashed: Understanding the SSL 3.0 Vulnerability

Rapid7 Blog

POODLE Unleashed: Understanding the SSL 3.0 Vulnerability

Jen Ellis's avatar

Jen Ellis

Petition for Reform of the DMCA and CFAA

Threat Research

Petition for Reform of the DMCA and CFAA

Jen Ellis's avatar

Jen Ellis

National Cyber Security Awareness Month: The Value of Vigilance

Industry Trends

National Cyber Security Awareness Month: The Value of Vigilance

Jen Ellis's avatar

Jen Ellis

National Cyber Security Awareness Month: Avoiding Cloud Crisis

Industry Trends

National Cyber Security Awareness Month: Avoiding Cloud Crisis

Jen Ellis's avatar

Jen Ellis

National Cyber Security Awareness Month: Basic Password Hygiene

Rapid7 Blog

National Cyber Security Awareness Month: Basic Password Hygiene

Jen Ellis's avatar

Jen Ellis