Posts tagged Detection and Response

3 min Detection and Response

The End of the Cybersecurity Skills Crisis (Maybe?)

The cybersecurity skills crisis is stuck in its fifth straight year of zero-progress. XDR may be able to change that.

4 min Detection and Response

InsightIDR Was XDR Before XDR Was Even a Thing: An Origin Story

With InsightIDR, you already have the capability to achieve XDR outcomes right now.

4 min Detection and Response

Building Threat-Informed Defenses: Rapid7 Experts Share Their Thoughts on MITRE ATT&CK

Three members of Rapid7's Managed Detection and Response team tell us about their firsthand experience MITRE's ATT&CK Matrix for Enterprise.

5 min Threat Intel

4 Simple Steps for an Effective Threat Intelligence Program

By following these simple steps, you can implement an effective threat intelligence program that's built for the modern cybersecurity environment.

1 min Detection and Response

Velociraptor to Announce Winners of Its 2021 Contributor Competition

Velociraptor and Rapid7 are excited to announce the winners of our 2021 Velociraptor Contributor Competition on Friday, October 8.

4 min Detection and Response

What's New in InsightIDR: Q3 2021 in Review

This post offers a closer look at some of the recent updates and releases in InsightIDR, our extended detection and response solution, from Q3 2021.

1 min Lost Bots

[The Lost Bots] Episode 6: D&R + VM = WINNING!

In this episode, Practice Advisor Devin Krugly joins to discuss how Detection and Response + Vulnerability Management = a winning combination.

3 min Detection and Response

SANS 2021 Threat Hunting Survey: How Organizations' Security Postures Have Evolved in the New Normal

The SANS Institute has conducted its sixth annual Threat Hunting Survey. Read this post for a preview of the survey's findings and its takeaways.

1 min Lost Bots

[The Lost Bots] Episode 5: Insider Threat

In this episode of The Lost Bots, we’re joined by Alan Foster (Manager, Domain Engineers) to discuss insider threats.

4 min Detection and Response

Security at Scale in the Open-Source Supply Chain

Securing supply chains based on open-source software requires scalable vulnerability management and vigilant monitoring.

3 min Detection and Response

Cybersecurity as Digital Detective Work: DFIR and Its 3 Key Components

We highlight 3 elements of a well-formulated digital forensics and incident response (DFIR) strategy.

4 min Threat Intel

SANS Experts: 4 Emerging Enterprise Attack Techniques

According to a report from the SANS Institute, the new wave of attack techniques isn't on the horizon — it’s here.

1 min Lost Bots

[The Lost Bots] Episode 4: Deception Technology

In this episode of The Lost Bots, Jeffrey talks one-on-one with you about one of his favorite subjects: deception technology.

5 min Cybersecurity

[R]Evolution of the Cyber Threat Intelligence Practice

Threat intelligence is transitioning from a separate pillar to a central hub that feeds all the functions of the security organization.

4 min Cybersecurity

Cybercriminals Selling Access to Compromised Networks: 3 Surprising Research Findings

To help fend off network compromise events and curb breach sales, we decided to analyze why and how criminals sell their network access.