5 min
SOAR
How to Accelerate Your SOAR Program to Full Speed in Less Than a Year
Here are some reflections and advice about setting up a SOAR program, through the lens of one practitioner's successful and innovative year.
4 min
SOAR
Deploying a SOAR Tool Doesn’t Have to Be Hard: I’ve Done It Twice
Here are some lessons learned launching and steps for success when launching a SOAR tool for the first time.
5 min
Ransomware
4 Fallacies That Keep SMBs Vulnerable to Ransomware, Pt. 2
In our second blog in this two-part series, Datto Inc. CISO Ryan Weeks outlines the third and fourth fallacies that perpetuate ransomware risk for SMBs.
5 min
Ransomware
4 Fallacies That Keep SMBs Vulnerable to Ransomware, Pt. 1
In this two-part blog series, we will present four common mistakes SMBs make when thinking about ransomware risk.
8 min
Rapid7 Perspective
Facing the Future: Rapid7’s 2019 Security Predictions
In traditional fashion, Rapid7 has rounded up some of the best minds in the security industry to predict what they expect to see in 2019.
6 min
Guest Perspective
The Taste of Our Dog Food (aka, Red Team OPSEC)
This is a guest post from a long-time Metasploit contributor and community
member [https://www.sempervictus.com/]. Over the next few months, Rapid7 will be
publishing a series of guest posts featuring unique perspectives on Metasploit
Framework and highlighting some of our community’s favorite functionality,
hidden gems, and backstories.
Want to contribute an idea or a post? Reach out to community[at]rapid7.com.
Red team exercises have been around in military contexts for a long time: the
idea
5 min
Metasploit
Guest post: Lurking in /lib
This is a guest post from a long-time Metasploit contributor and community
member. Over the next few months, Rapid7 will be publishing a series of guest
posts featuring unique perspectives on Metasploit Framework and highlighting
some of our community’s favorite functionality, hidden gems, and backstories.
Want to contribute an idea or a post? Reach out to community[at]rapid7.com.
Back in my day, you could get dinner, dessert, and ride the trolley home all for a nickel. Oh, and we used SVN for
5 min
Rapid7 Perspective
Visions past and future: 2018 security predictions
Happy 2018, fellow humans (but not to you, bot army!). Like we've done in years
before, we recently rounded up some of the best minds and most trenchant
commentators the security industry has to offer and asked them to sum up the
year gone by (whether good, bad, or ugly) and shed light on what's in store for
the 363 days ahead. To see how our predictions fared in prior years, check out
the 2015
[/2014/12/19/rapid7-perspectiverapid7-2014-infosec-retrospective-predictions-for-2015/]
, 2016 [/2015/
2 min
NIST
NIST Standards and Why They Matter
A primer on implementing NIST recommendations by guest author Matt Kelly
2 min
Security Strategy
Filling big gaps in security programs
Guest author Kevin Beaver talks about helping organizations bridge policy-practice gaps in their security programs.