Articles By: Rapid7

The Complete Cloud Security Buyer’s Guide

Today’s cloud security teams are tasked with attempting to tame the seemingly untameable. With the need to secure globe-spanning cloud networks, it may seem like the majority of cloud security providers offer the same thing: a solution to the problem of cloud security. However, a one-size-fits-all solution could be hard to come by. Many vendors tout cloud security platforms, but […]

Read more ›

The Essential Checklist for Security Consolidation

As everyone predicted, consolidation is happening. Do it the right way and it’s a real staffing and efficiency gamechanger. In this checklist you’ll find a few things that might surprise you regarding your attack surface along with questions to ask yourself as you weigh your options.

Read more ›

2023 SANS™ Report: The State Of MDR

In about two years, Gartner predicts half of organizations will be using managed detection and response (MDR).1 The pace and lethality of attacks require greater operational capacity and expertise – and offloading 24/7 detection and response while you focus on strategy is probably an inescapable good thing. In this report, the SANS Institute dives into the current state of MDR. […]

Read more ›

2022 Vulnerability Intelligence Report

Widespread attacks and zero-day exploitation hit all-time highs in 2021, pushing security teams around the world to their limits and beyond. The attack landscape in 2022 was slightly more nuanced, as adversaries evolved operations and leveraged both new and known vulnerabilities to accomplish their goals. In Rapid7’s annual vulnerability intelligence report, they analyzed 50 of 2022’s most notable vulnerabilities and […]

Read more ›

Case Study: New York Hospital Defeats a Potential Ransomware Attack Using Rapid7’s InsightIDR

A large, New York City hospital with a complex environment consisting of more than 4,000 endpoints and a network that includes both on premise and remote users, is dealing with increasing volumes of data and a changing environment that requires around-the-clock security monitoring. The hospital’s cyber security team is responsible for protecting tens of thousands of highly-confidential patient records protected […]

Read more ›

TI MDR Case Study: DAMAC Properties

DAMAC, a luxury real estate developer in an expansion phase, began positioning themselves to become a global digital brand. Last year, DAMAC doubled its IT investments and established an information security program to support more than 1,500 end users spread across 40 offices As DAMAC built out the new security function, the 4-person security team faced a number of challenges; […]

Read more ›

Cybersecurity Target Operating Model KPIs

Is your organization aspiring to become cybersecurity proficient? Creating a plan so that your business can adopt and maintain cybersecurity best practices is a must against the backdrop of global trade and the bad actors that threaten it. This Rapid7 Cybersecurity Target Operating Model (TOM) guide explores the Key Performance Indicators (KPIs) you’ll need to measure in order to implement […]

Read more ›

Good Passwords for Bad Bots Research Report

New Research Shows Password Health is on Life Support With so much of the workforce operating on virtual machines in the cloud, it is critical to know just how secure the most common access points really are. This report takes a look at credentials associated with SSH and RDP — two of the most common remote access protocols — and […]

Read more ›