贴有标签的帖子

4分钟 CISOs

How CISOs’ Roles – 和 安全操作 – Will Change in 2024

It’s fair to say that 2023 was a turning point for the cybersecurity industry, 和 no one felt it more than the CISO. From the onslaught of ransomware 和 零日攻击, [http://wlp.wjqklgz.com/blog/post/2024/01/12/2023-ransomware-stats-a-look-back-to-plan-ahead/] to the SEC’s new reporting rules [http://wlp.wjqklgz.com/globalassets/_pdfs/policy/sec-cybersecurity-compliance-solution-brief.pdf] , 和 added to technological innovation 和 sprawl, CISOs have never been under 更大的压力

2分钟 安全策略

ISO 27001 认证: What it is 和 why it matters

Rapid7's ISMS is ISO 27001 certified. This certification validates that our security strategy 和 processes meet very high st和ards 和 underscores our commitment to corporate 和 customer data security.

5分钟 网络安全

No Damsels in Distress: How Media 和 Entertainment Companies Can Secure Data 和 Content

As media 和 entertainment companies grow their cloud footprints, they’re also opening themselves up to vulnerabilities threat actors can exploit.

4分钟 安全策略

Building 网络安全 KPIs for Business Leaders 和 Stakeholders

在这篇文章中, we discuss how to operationalise security into an overall strategy measured by cybersecurity KPIs.

2分钟 研究

Today’s SOC Strategies Will Soon Be Inadequate

New research sponsored by Rapid7 explores the momentum behind SOC modernization 和 the role extended detection 和 response (XDR) plays.

5分钟 安全策略

How to Build 和 Enable a Cyber Target Operating Model

在最近的一次网络研讨会上, Rapid7's EMEA CTO Jason Hart explained the journey to a targeted operating cybersecurity model.

4分钟 网络安全

4 Strategies to Help Your 网络安全 Budget Work Harder

网络安全 is a growing concern for organisations across all industries, 和 budget requests are increasing as a result.

5分钟 脆弱性管理

How to Strategically Scale Vendor Management 和 Supply Chain Security

Here are simple changes that can help you provide more impactful supply chain security guidance 和 controls to decrease risk.

5分钟 Russia-Ukraine冲突

8 Tips for Securing Networks When Time Is Scarce

In light of increased cyber risk surrounding the Russia-Ukraine conflict, we’ve put together 8 tips that defenders can take right now to prepare.

4分钟 脆弱性管理

The VM Lifecycle: How We Got Here, 和 Where We’re Going

在这篇文章中, we explore the concept of a vulnerability management lifecycle, providing practical guidance 和 definitions.

6分钟 Log4Shell

Log4Shell Strategic 响应: 5 Practices for 脆弱性管理 at Scale

Where do you begin to respond to a critical vulnerability like the one in Apache’s Log4j Java library (a.k.a. Log4Shell)? 从这5个概念开始.

4分钟 Ransomware

3 Strategies That Are More Productive Than Hack Back

Hack back, as used by non-government entities, is problematic for many reasons. Here are 3 alternative strategies to thwart the attackers.

3分钟 安全策略

Kill Chains: Part 3→下一步是什么

As the final entry in this blog series, we want to quickly recap what we have previously discussed 和 also look into the possible future of kill chains.

2分钟 安全策略

Kill Chains: Part 2→Strategic 和 tactical use cases

Let’s now take a look at how you can leverage the different kill chains to overcome vulnerabilities 和 win the day against attackers.

3分钟 检测和响应

Kill Chains: Part 1→Strategic 和 operational value

最近, the term has been conscripted by the cybersecurity world to help businesses 和 security organizations go on the offensive, ensuring there are no gaps in their mitigation strategies 和 that their threat-hunting processes are sound.