Posts tagged Automation and Orchestration

Filtering and Automated Decisions with PEG.js and React-Mentions

Security Operations

Filtering and Automated Decisions with PEG.js and React-Mentions

Rapid7's avatar

Rapid7

Defining the Roles & Responsibilities of Your Security Team

Security Operations

Defining the Roles & Responsibilities of Your Security Team

Rapid7's avatar

Rapid7

Does Security Automation Mean SOC Employees Will Be Obsolete?

Security Operations

Does Security Automation Mean SOC Employees Will Be Obsolete?

Rapid7's avatar

Rapid7

A Framework for Selecting and Implementing Security Tools Today

Security Operations

A Framework for Selecting and Implementing Security Tools Today

Rapid7's avatar

Rapid7

Building a Simple CLI Tool with Golang

Security Operations

Building a Simple CLI Tool with Golang

Rapid7's avatar

Rapid7

Bro Series: The Programming Language

Products and Tools

Bro Series: The Programming Language

Rapid7's avatar

Rapid7

Defender Spotlight: April C. Wright of Verizon Enterprise Services

Security Operations

Defender Spotlight: April C. Wright of Verizon Enterprise Services

Rapid7's avatar

Rapid7

How Security Orchestration Can Stop Insider and Outsider Attacks

Security Operations

How Security Orchestration Can Stop Insider and Outsider Attacks

Rapid7's avatar

Rapid7

How to Build a Powerful Cybersecurity Arsenal with Free & Open Source Tools

Security Operations

How to Build a Powerful Cybersecurity Arsenal with Free & Open Source Tools

Rapid7's avatar

Rapid7

Making Bug Reporting Easier with AWS S3 and AWS Lambda

Security Operations

Making Bug Reporting Easier with AWS S3 and AWS Lambda

Rapid7's avatar

Rapid7

Quick security wins in Golang (Part 1)

Security Operations

Quick security wins in Golang (Part 1)

Rapid7's avatar

Rapid7

A Guide to Defending Pokemon Go Gyms: Lessons from Cybersecurity

Security Operations

A Guide to Defending Pokemon Go Gyms: Lessons from Cybersecurity

Rapid7's avatar

Rapid7

Local Cybersecurity Meetups Near You

Security Operations

Local Cybersecurity Meetups Near You

Rapid7's avatar

Rapid7

The Best Strategies for a Successful Security Operations Center Explained by 4 Security Experts

Security Operations

The Best Strategies for a Successful Security Operations Center Explained by 4 Security Experts

Rapid7's avatar

Rapid7

AWS Series: Creating a Privoxy, Tor Instance

Products and Tools

AWS Series: Creating a Privoxy, Tor Instance

Rapid7's avatar

Rapid7

AWS Series: OpenSWAN L2TP over IPSEC VPN Configuration

Products and Tools

AWS Series: OpenSWAN L2TP over IPSEC VPN Configuration

Rapid7's avatar

Rapid7

Bro Series: Creating a Bro Cluster

Products and Tools

Bro Series: Creating a Bro Cluster

Rapid7's avatar

Rapid7

Defender Spotlight: Ryan Huber of Slack

Security Operations

Defender Spotlight: Ryan Huber of Slack

Rapid7's avatar

Rapid7

What are Networking Intrusion Prevention/Detection Systems?

Detection and Response

What are Networking Intrusion Prevention/Detection Systems?

Rapid7's avatar

Rapid7

GDB for Fun (and Profit!)

Products and Tools

GDB for Fun (and Profit!)

Rapid7's avatar

Rapid7

How to Create a Culture of Security Ownership Across Your Organization

Security Operations

How to Create a Culture of Security Ownership Across Your Organization

Rapid7's avatar

Rapid7