Security Management Resources

Learn how to make faster, smarter security decisions with our security management resources

These security management resources share best practices, guide you through successful implementations and help you understand the power of truly knowing your threat and risk posture.

Featured Content

Webcast

Heartbleed War Room: Briefing, Strategy and Q&A

The OpenSSL Heartbleed vulnerability rocked the world of security professionals. The task of securing your organization from this single vulnerability can seem overwhelming. In this webcast, security strategist Trey Ford and security researcher Mark Schloesser will help you understand how the vulnerability is exploited, discuss the impact it has on the system, explain how to detect if you are vulnerable, and discuss the best way to develop a strategy to secure your environment.

Register For The Webcast
Whiteboard Wednesday

Cloud Security Monitoring: Why Monitoring Cloud Services Alone Isn’t Enough

In today’s Whiteboard Wednesday, Lital Asher-Dotan, Senior Product Marketing Manager, will talk about cloud security monitoring and why monitoring cloud services alone isn’t enough.

WATCH VIDEO

Latest Resources

Security Guide: How to Evade Anti-Virus Detection

Penetration testing can give you a clear view of the vulnerabilities that can easily be exploited within your environment; however, organizations need to be able to understand and test their users' behavior without anti-virus programs stopping these tests in their tracks. A great way to explore that user behavior is by deploying social engineering programs during a pen test. In this guide, penetration testers will learn how to evade anti-virus detection on target machines.

The Nexpose Expert System: Using an Expert System for Deeper Vulnerability Scanning

This paper explains how Rapid7 Nexpose uses an expert system to achieve better results in vulnerability scanning compared to traditional procedural methods. After a brief discussion of the product objectives and implementation, this paper explores the use of expert systems to achieve accurate and detailed vulnerability results.