4分钟
CISOs
How CISOs’ Roles – 和 安全操作 – Will Change in 2024
It’s fair to say that 2023 was a turning point for the cybersecurity industry,
和 no one felt it more than the CISO. From the onslaught of ransomware 和
零日攻击,
[http://wlp.wjqklgz.com/blog/post/2024/01/12/2023-ransomware-stats-a-look-back-to-plan-ahead/]
to the SEC’s new reporting rules
[http://wlp.wjqklgz.com/globalassets/_pdfs/policy/sec-cybersecurity-compliance-solution-brief.pdf]
, 和 added to technological innovation 和 sprawl, CISOs have never been under
更大的压力
2分钟
安全策略
ISO 27001 认证: What it is 和 why it matters
Rapid7's ISMS is ISO 27001 certified. This certification validates that our security strategy 和 processes meet very high st和ards 和 underscores our commitment to corporate 和 customer data security.
5分钟
网络安全
No Damsels in Distress: How Media 和 Entertainment Companies Can Secure Data 和 Content
As media 和 entertainment companies grow their cloud footprints, they’re also opening themselves up to vulnerabilities threat actors can exploit.
4分钟
安全策略
Building 网络安全 KPIs for Business Leaders 和 Stakeholders
在这篇文章中, we discuss how to operationalise security into an overall strategy measured by cybersecurity KPIs.
2分钟
研究
Today’s SOC Strategies Will Soon Be Inadequate
New research sponsored by Rapid7 explores the momentum behind SOC modernization 和 the role extended detection 和 response (XDR) plays.
5分钟
安全策略
How to Build 和 Enable a Cyber Target Operating Model
在最近的一次网络研讨会上, Rapid7's EMEA CTO Jason Hart explained the journey to a targeted operating cybersecurity model.
4分钟
网络安全
4 Strategies to Help Your 网络安全 Budget Work Harder
网络安全 is a growing concern for organisations across all industries, 和 budget requests are increasing as a result.
5分钟
脆弱性管理
How to Strategically Scale Vendor Management 和 Supply Chain Security
Here are simple changes that can help you provide more impactful supply chain security guidance 和 controls to decrease risk.
5分钟
Russia-Ukraine冲突
8 Tips for Securing Networks When Time Is Scarce
In light of increased cyber risk surrounding the Russia-Ukraine conflict, we’ve put together 8 tips that defenders can take right now to prepare.
4分钟
脆弱性管理
The VM Lifecycle: How We Got Here, 和 Where We’re Going
在这篇文章中, we explore the concept of a vulnerability management lifecycle, providing practical guidance 和 definitions.
6分钟
Log4Shell
Log4Shell Strategic 响应: 5 Practices for 脆弱性管理 at Scale
Where do you begin to respond to a critical vulnerability like the one in Apache’s Log4j Java library (a.k.a. Log4Shell)? 从这5个概念开始.
4分钟
Ransomware
3 Strategies That Are More Productive Than Hack Back
Hack back, as used by non-government entities, is problematic for many reasons. Here are 3 alternative strategies to thwart the attackers.
3分钟
安全策略
Kill Chains: Part 3→下一步是什么
As the final entry in this blog series, we want to quickly recap what we have previously discussed 和 also look into the possible future of kill chains.
2分钟
安全策略
Kill Chains: Part 2→Strategic 和 tactical use cases
Let’s now take a look at how you can leverage the different kill chains to overcome vulnerabilities 和 win the day against attackers.
3分钟
检测和响应
Kill Chains: Part 1→Strategic 和 operational value
最近, the term has been conscripted by the cybersecurity world to help businesses 和 security organizations go on the offensive, ensuring there are no gaps in their mitigation strategies 和 that their threat-hunting processes are sound.