INCIDENT DETECTION & RESPONSE
2016 Verizon Data Breach Investigations Report: Top 5 Takeaways
Highlights from the 2016 Verizon Data Breach Investigations Report, including a look at new trends and what stayed the same.
Disrupt the Attack Chain: Rapid7's Approach to Incident Detection & Response
Incident detection and response spending is steadily rising, but all the money in the world doesn't change the fact that incident detection is really hard to get right. Rapid7 InsightIDR gives you the confidence to detect and investigate attacks by combining user behavior analytics with our deep knowledge of attacker strategies. Learn how we integrate with your existing network & security stack and combine machine learning, threat intelligence, custom intruder traps, and more...getting you from compromise to containment - FAST.
2015: State of Incident Detection & Response
See the survey results and how you stack up
Security and PCI: 4 Things You Need to Know
Findings from the Verizon 2015 PCI Compliance Report.
Top 5 Takeaways from Verizon Data Breach Investigations Report
Prepare your enterprise to conduct individualized self-assessments of risk, so you can make realistic decisions on how to avoid cyber threats.
More Efficient Incident Detection and Investigation Saves $400,000 per Year, According to New IDC Data
Measuring incident cost versus breach cost provides great business case for more efficient incident detection and response.
The Credit Card Criminal's Playbook
From initial entry to fraud, this timeline of a retail breach shows the steps criminals take to execute a retail data breach attack.
Nightmare on Pwn Street
Ghouls and goblins abound in the security landscape, and organizations still fall victim to the same old tricks. Rapid7 investigated this spooky phenomenon, highlighting a number of threats that continue to get worse, not better.
Growth of BYOD and Mobile Security
With BYOD growing, it is important to understand the risks involved with the bring your own device trend. Check out this infographic to learn more about BYOD and mobile security.
Life's a Breach: Yahoo Gets Burned by SQL Injection
Rapid7 analyzed the details of 453,492 breached Yahoo! records and found that the majority of the published passwords were only "poor" or "weak" in strength due to a number of basic password security errors. In addition, over 100,000 Gmail accounts and thousands of Hotmail and AOL accounts may also have been compromised if users had reused their passwords across accounts. This infographic details other key findings from the analysis.
LinkedIn Passwords Lifted
When 6.46 million LinkedIn password hashes were dumped in a Russian hacker forum, Rapid7 analyzed the first 165,000 cracked to see what password security lessons could be learned. The results reveal a worrying trend of people continuing to use obvious words or number sequences, which have by now become part of hackers' code-cracking algorithms. This infographic identifies the common mistakes to avoid in creating secure passwords.
IPv6 Enabled Systems Quadrupled Over the Past 3 Years
While 10% of the world's top websites now offer IPv6 services, most companies haven't formulated an IPv6 strategy for the network. However, the issue is that most devices you have rolled out in the past 5 years have been IPv6-ready, if not IPv6-enabled.