Posts tagged Security Strategy

4 min Ransomware

3 Strategies That Are More Productive Than Hack Back

Hack back, as used by non-government entities, is problematic for many reasons. Here are 3 alternative strategies to thwart the attackers.

4 min 2022 Planning

2022 Planning: Prioritizing Defense and Mitigation Through Left of Boom

In this post, we'll use ransomware as an example for 3 areas where you can apply a left-of-boom approach in your defenses in the coming year.

4 min 2022 Planning

2022 Planning: The Path to Effective Cybersecurity Maturity

Achieving cybersecurity maturity isn't something you can do overnight — it requires a significant amount of planning, prioritizing, and coordinating across the business.

4 min 2022 Planning

2022 Planning: Straight Talk on Zero Trust

What does zero trust really mean, and how can you assess if it has a practical place in your organization's cybersecurity strategy for 2022?

3 min Kill Chain

Kill Chains: Part 3→What’s next

As the final entry in this blog series, we want to quickly recap what we have previously discussed and also look into the possible future of kill chains.

2 min Kill Chain

Kill Chains: Part 2→Strategic and tactical use cases

Let’s now take a look at how you can leverage the different kill chains to overcome vulnerabilities and win the day against attackers.

3 min Security Strategy

Addressing the OT-IT Risk and Asset Inventory Gap

Cyber-espionage and exploitation from nation-state-sanctioned actors have only become more prevalent in recent years.

4 min Security Strategy

Top Security Recommendations for 2021

To help everyone stay safer in 2021, we wanted to share some security recommendations to help you better secure your business and minimize risk.

5 min Security Strategy

UPnP With a Holiday Cheer

For today’s discussion, this blog post will only cover the port forwarding services and will also share a Python script you can use to start examining this service.

4 min Security Strategy

Help Others Be "Cyber Aware" This Festive Season—And All Year Round!

Are you tired of being the cybersecurity help desk for everyone you know? This blog is for you!

3 min Vulnerability Management

Defining Vulnerability Risk Management (and How to Build a Modern VRM Program)

Once upon a time (just a handful of years ago), vulnerability management [https://www.rapid7.com/solutions/vulnerability-management/] programs focused solely on servers, running quarterly scans that targeted only critical systems. But that was then, and you can’t afford such a limited view in the now. Truth is, vulnerability exploitation now happens indiscriminately across the modern attack surface—from local and remote endpoints to on-prem and cloud infrastructure to web applications and con

3 min Security Strategy

Small Business in a Big World (Wide Web): What You Should Know to Stay Secure

In this blog, we share a number of tips to help small businesses decrease the chance of becoming a victim of a cyber-attack.

1 min Security Strategy

How to Easily Schedule a Meeting with Rapid7 Support

Rapid7 is pleased to announce that you can now schedule a meeting with your Support Engineer with the click of a button.

3 min Podcast

Why Having the Right Team Is Vital to Advancing Security

On this week's episode of Security Nation, we caught up with David Rogers about his recent royal recognition and how he credits his team for his success.

3 min Security Strategy

How to Get Buy-In When Your C-Suite Doesn’t Speak Security

In our latest podcast, Lee Brotherston of ecobee explains how to get security program buy-in in early-stage companies from the top.