Jesse Mack's picture

Posts by Jesse Mack

3 Ways to Improve Data Protection in the Cloud

Exposure Management

3 Ways to Improve Data Protection in the Cloud

Jesse Mack's avatar

Jesse Mack

Pushing Open-Source Security Forward: Insights From Black Hat 2022

Products and Tools

Pushing Open-Source Security Forward: Insights From Black Hat 2022

Jesse Mack's avatar

Jesse Mack

[VIDEO] An Inside Look at Black Hat 2022 From the Rapid7 Team

Rapid7 Blog

[VIDEO] An Inside Look at Black Hat 2022 From the Rapid7 Team

Jesse Mack's avatar

Jesse Mack

What We're Looking Forward to at Black Hat, DEF CON, and BSidesLV 2022

Threat Research

What We're Looking Forward to at Black Hat, DEF CON, and BSidesLV 2022

Jesse Mack's avatar

Jesse Mack

Collaboration Drives Secure Cloud Innovation: Insights From AWS re:Inforce

Cloud and Devops Security

Collaboration Drives Secure Cloud Innovation: Insights From AWS re:Inforce

Jesse Mack's avatar

Jesse Mack

[VIDEO] An Inside Look at AWS re:Inforce 2022 From the Rapid7 Team

Cloud and Devops Security

[VIDEO] An Inside Look at AWS re:Inforce 2022 From the Rapid7 Team

Jesse Mack's avatar

Jesse Mack

What We’re Looking Forward to at AWS re:Inforce

Products and Tools

What We’re Looking Forward to at AWS re:Inforce

Jesse Mack's avatar

Jesse Mack

4 Strategies for Achieving Greater Visibility in the Cloud

Cloud and Devops Security

4 Strategies for Achieving Greater Visibility in the Cloud

Jesse Mack's avatar

Jesse Mack

3 Key Challenges for Cloud Identity and Access Management

Security Operations

3 Key Challenges for Cloud Identity and Access Management

Jesse Mack's avatar

Jesse Mack

Security Is Shifting in a Cloud-Native World: Insights From RSAC 2022

Cloud and Devops Security

Security Is Shifting in a Cloud-Native World: Insights From RSAC 2022

Jesse Mack's avatar

Jesse Mack

Defending Against Tomorrow's Threats: Insights From RSAC 2022

Threat Research

Defending Against Tomorrow's Threats: Insights From RSAC 2022

Jesse Mack's avatar

Jesse Mack

[VIDEO] An Inside Look at the RSA 2022 Experience From the Rapid7 Team​

Threat Research

[VIDEO] An Inside Look at the RSA 2022 Experience From the Rapid7 Team​

Jesse Mack's avatar

Jesse Mack

3 Takeaways From the 2022 Verizon Data Breach Investigations Report

Exposure Management

3 Takeaways From the 2022 Verizon Data Breach Investigations Report

Jesse Mack's avatar

Jesse Mack

What's Changed for Cybersecurity in Banking and Finance: New Study

Exposure Management

What's Changed for Cybersecurity in Banking and Finance: New Study

Jesse Mack's avatar

Jesse Mack

Cloud-Native Application Protection (CNAPP): What's Behind the Hype?

Products and Tools

Cloud-Native Application Protection (CNAPP): What's Behind the Hype?

Jesse Mack's avatar

Jesse Mack

3 Ways InsightIDR Users Are Achieving XDR Outcomes

Products and Tools

3 Ways InsightIDR Users Are Achieving XDR Outcomes

Jesse Mack's avatar

Jesse Mack

Demystifying XDR: The Time for Implementation Is Now

Products and Tools

Demystifying XDR: The Time for Implementation Is Now

Jesse Mack's avatar

Jesse Mack

Demystifying XDR: How Curated Detections Filter Out the Noise

Products and Tools

Demystifying XDR: How Curated Detections Filter Out the Noise

Jesse Mack's avatar

Jesse Mack

Log4Shell 2 Months Later: Security Strategies for the Internet's New Normal

Exposure Management

Log4Shell 2 Months Later: Security Strategies for the Internet's New Normal

Jesse Mack's avatar

Jesse Mack

Demystifying XDR: Where SIEM and XDR Collide

Detection and Response

Demystifying XDR: Where SIEM and XDR Collide

Jesse Mack's avatar

Jesse Mack

Demystifying XDR: How Humans and Machines Join Forces in Threat Response

Detection and Response

Demystifying XDR: How Humans and Machines Join Forces in Threat Response

Jesse Mack's avatar

Jesse Mack