Security Advisory Services
Training & Certification
Request a Proposal
User Behavior Analytics
By Compliance Requirement
Find a Partner
Become a Partner
News & Press Releases
Events & Webcasts
The “threat landscape” is a moving, shifting form that will look different to different organizations—it all depends on where you are standing. Some people may be staring at a wide open grassland where the landscape is understood and the threats are easy to identify (though no less deadly), and others may be facing a dense jungle of hidden threats. While it's possible to develop a universal threat landscape that may be useful for general security research and developing high-level incident response frameworks, it is more useful for defenders to have a solid understanding of their own unique threat landscape.
The Rapid7 Threat Report leverages intelligence from Rapid7’s Insight Platform, Rapid7 Managed Services, Rapid7 Incident Response engagements, and the Metasploit community to put this shifting landscape into perspective. It gives you a clear picture of the threats that you face within your unique industry, and how those threats change throughout the year.
Download the first quarterly Rapid7 Threat Report to see the breakdown of the 2017 Q1 threat landscape, note the key learnings, and start building your unique defense strategy.
Register for the webcast, to hear directly from the researchers and take a closer look at the findings.
Read the press release to learn more about Rapid7's dedication to collaboration and information sharing among the cybersecurity community.
Join the webcast to learn more and get answers from the authors.
In this Whiteboard Wednesday, Bob Rudis gives a 3-minute overview of the first Threat Report.
Join Rebekah Brown, Rapid7's threat intelligence lead, and Bob Rudis, Rapid7's chief data scientist, as they explain the findings and lessons learned, and discuss how to apply them to your own security strategy.
Thank you for registering! Please watch for an email with details and access information.
Across the board, attackers still rely on user interaction to carry out their attacks.
– Rapid7 Threat Report 2017 Q1
When a new vulnerability that is relatively easy for an attacker to exploit is identified, we may have days—not months—before systems are being compromised in a massive and often untargeted manner.
We saw a lower number of alerts that required a human analyst in 2017Q1 than we have traditionally expected.
Rebekah Brown, threat intelligence lead at Rapid7, discusses how threat intelligence fits into a larger security program.
In this on-demand webcast, learn how to leverage threat intelligence as a critical component in breach prevention, detection, and investigation.