• Close
  • Infographics

    2016 Verizon Data Breach Investigations Report

    2016 Verizon Data Breach Investigations Report: Top 5 Takeaways

    Highlights from the 2016 Verizon Data Breach Investigations Report, including a look at new trends and what stayed the same.

    Disrupt the attack chain

    Disrupt the Attack Chain: Rapid7's Approach to Incident Detection & Response

    Incident detection and response spending is steadily rising, but all the money in the world doesn't change the fact that incident detection is really hard to get right. Rapid7 InsightIDR gives you the confidence to detect and investigate attacks by combining user behavior analytics with our deep knowledge of attacker strategies. Learn how we integrate with your existing network & security stack and combine machine learning, threat intelligence, custom intruder traps, and more...getting you from compromise to containment - FAST.

    2015:State of Incident Detection & Response

    2015: State of Incident Detection & Response

    See the survey results and how you stack up

    Top 5 Takeaways from Security and PCI: 4 Things You Need to Know

    Security and PCI: 4 Things You Need to Know

    Findings from the Verizon 2015 PCI Compliance Report.

    Top 5 Takeaways from Verizon Data Breach Investigations Report

    Top 5 Takeaways from Verizon Data Breach Investigations Report

    Prepare your enterprise to conduct individualized self-assessments of risk, so you can make realistic decisions on how to avoid cyber threats.

    More Efficient Incident Detection and Investigation Saves $400,000 per Year, According to New IDC Data

    More Efficient Incident Detection and Investigation Saves $400,000 per Year, According to New IDC Data

    Measuring incident cost versus breach cost provides great business case for more efficient incident detection and response.

    The Credit Card Criminal's Playbook

    The Credit Card Criminal's Playbook

    From initial entry to fraud, this timeline of a retail breach shows the steps criminals take to execute a retail data breach attack.

    Nightmare on Pwn Street

    Nightmare on Pwn Street

    Ghouls and goblins abound in the security landscape, and organizations still fall victim to the same old tricks. Rapid7 investigated this spooky phenomenon, highlighting a number of threats that continue to get worse, not better.

    Invasion of the Mobile Monster!

    Growth of BYOD and Mobile Security

    With BYOD growing, it is important to understand the risks involved with the bring your own device trend. Check out this infographic to learn more about BYOD and mobile security.

    Life's a Breach: Yahoo Gets Burned by SQL Injection

    Life's a Breach: Yahoo Gets Burned by SQL Injection

    Rapid7 analyzed the details of 453,492 breached Yahoo! records and found that the majority of the published passwords were only "poor" or "weak" in strength due to a number of basic password security errors. In addition, over 100,000 Gmail accounts and thousands of Hotmail and AOL accounts may also have been compromised if users had reused their passwords across accounts. This infographic details other key findings from the analysis.

    LinkedIn Passwords Lifted

    LinkedIn Passwords Lifted

    When 6.46 million LinkedIn password hashes were dumped in a Russian hacker forum, Rapid7 analyzed the first 165,000 cracked to see what password security lessons could be learned. The results reveal a worrying trend of people continuing to use obvious words or number sequences, which have by now become part of hackers' code-cracking algorithms. This infographic identifies the common mistakes to avoid in creating secure passwords.

    IPv6 Enabled Systems Quadrupled Over the Past 3 Years

    IPv6 Enabled Systems Quadrupled Over the Past 3 Years

    While 10% of the world's top websites now offer IPv6 services, most companies haven't formulated an IPv6 strategy for the network. However, the issue is that most devices you have rolled out in the past 5 years have been IPv6-ready, if not IPv6-enabled.