4 min
Industry Cyber-Exposure Report (ICER)
Rapid7's 2021 ICER Takeaways: Email Security Among the Fortune 500
We all know and love—or at least begrudgingly rely upon—email. It is a pillar of modern communications, but is unfortunately also highly susceptible to being leveraged as a mechanism for malicious actions, such as spoofing or phishing.
4 min
Phishing
How to Turbocharge Your Phishing Response Plan
A quick reaction to a phishing threat can mean the difference between a massive breach or a fast fix.
3 min
National Cybersecurity Awareness Month
National Cybersecurity Awareness Month 2019: Must-Read Blogs on ‘Protect IT’
In this blog, we will highlight must-read blogs that align with NCSAM’s “Protect IT” sub-themes of be secure, theft and scams, and your digital home.
5 min
National Cybersecurity Awareness Month
National Cybersecurity Awareness Month 2019: Must-Read Blogs on ‘Secure IT’
In this blog, we will highlight must-read blog posts that align with NCSAM’s “Secure IT” sub-themes of strong passwords, MFA, work secure, phishing, and e-commerce.
4 min
National Cybersecurity Awareness Month
National Cybersecurity Awareness Month 2019: Must-Read Blogs on ‘Own IT’
In this blog, we will highlight must-read blogs that align with NCSAM’s “Own IT” sub-themes of traveling tips, online security, social media, and the Internet of Things (IoT).
3 min
Automation and Orchestration
How to Automate Phishing Investigations and Remediation
Here are four ways security orchestration and automation (SOAR) tools can streamline the phishing investigation process.
4 min
Phishing
Tips for a Successful Phishing Engagement
Many factors can go into making a phishing engagement a success, so in this blog, we will share some tips for making sure your organization gets the most out of its upcoming engagement.
3 min
Phishing
Lessons from a Pen Test: The Power of a Well-Researched and Well-Timed Phishing Email
On a recent pen test, Steve Laura saw just how effective phishing emails can be with the right research and timing.
4 min
Phishing
What You Can Learn from Our Successful Simulated Phishing Attack of 45 CEOs
I was recently invited to a cybersecurity event to raise awareness on phishing by simulating targeted campaigns against the CEO attendees. Here's how they fared.
5 min
Haxmas
The Nightmare After Christmas
With all the incidents that occurred in 2018, you may feel a bit like a CISO Scrooge. Here's how you can prepare for next year (in poem form!)
4 min
Medical
Top 5 Threats Healthcare Organizations Face and How to Combat Them
Looking to protect your healthcare organization from cyber-threats? Here are the top five threats to look out for and tips on how to outsmart attackers.
3 min
Penetration Testing
7 Funny and Punny Halloween Costume Ideas for Tech and Cybersecurity Pros
Stuck on what to be this year? Here are some of our favorite Halloween costume ideas for tech and cybersecurity professionals.
4 min
National Cybersecurity Awareness Month
National Cybersecurity Awareness Month: Tips for Improving Your Personal Pa55w0rd! Management
It's National Cybersecurity Awareness Month, which means it's a great time to chat about why you should consider a password manager to stay secure.
4 min
Threat Intel
How Cybercriminals Use Pinterest to Run Fraud Scams
There are a variety of scams hackers can run on Pinterest, but for this post, we’ll focus on fraud and financial scams.
5 min
Breach Preparedness
Phishing Attacks Duping Your Users? Here’s a Better Anti-Phishing Strategy.
You’ve hired the best of the best and put up the right defenses, but one thing
keeps slipping in the door: phishing emails. Part of doing business today,
unfortunately, is dealing with phishing attacks
[https://www.rapid7.com/fundamentals/phishing-attacks/]. Few organizations are
immune to phishing anymore; it’s on every security team’s mind and has become
the number one threat to organizations
[https://www.sans.org/reading-room/whitepapers/analyst/2017-threat-landscape-survey-users-front-line-3