Articles By: Rapid7

TI MDR Case Study: DAMAC Properties

DAMAC, a luxury real estate developer in an expansion phase, began positioning themselves to become a global digital brand. Last year, DAMAC doubled its IT investments and established an information security program to support more than 1,500 end users spread across 40 offices As DAMAC built out the new security function, the 4-person security team faced a number of challenges; […]

Read more ›

Cybersecurity Target Operating Model KPIs

Is your organization aspiring to become cybersecurity proficient? Creating a plan so that your business can adopt and maintain cybersecurity best practices is a must against the backdrop of global trade and the bad actors that threaten it. This Rapid7 Cybersecurity Target Operating Model (TOM) guide explores the Key Performance Indicators (KPIs) you’ll need to measure in order to implement […]

Read more ›

Good Passwords for Bad Bots Research Report

New Research Shows Password Health is on Life Support With so much of the workforce operating on virtual machines in the cloud, it is critical to know just how secure the most common access points really are. This report takes a look at credentials associated with SSH and RDP — two of the most common remote access protocols — and […]

Read more ›

MDR vs. The Inevitable: Breach Response Timelines From the Rapid7 SOC

Managed Detection and Response (MDR): Inside MDR Response Timelines & Tick Tocks In this new eBook you’ll find real life examples of common threats handled end-to-end by Rapid7 MDR. Discover the speed and accuracy with which SOC experts identify, contain, and respond to attacks for customers. IBM says it takes an average of 287 days to identify a breach and […]

Read more ›

13 Tips for Overcoming the Cybersecurity Talent Shortage

600,000+ cybersecurity jobs are still vacant throughout the industry, causing a stressful situation for anyone running a detection and response program. Finding a security “unicorn” is near impossible and retaining them is even harder. If you’re struggling with this, you’re not alone – there are teams that suffer 100% turnover in a matter of years! In this eBook, we’ve pulled […]

Read more ›

SANS 2022 Top New Attacks and Threat Report

The annual SANS Top New Attacks and Threat Report is out and full of some of the most critical data and best practices from some of the industry’s leading cybersecurity experts. Based each year on the SANS Institute’s “Five Most Dangerous Attacks” panel at RSA, the Top New Attacks and Threat Report looks at the trends in attacker behavior and […]

Read more ›

The Total Economic Impact™ of Rapid7 Managed Detection and Response

Keeping your environment safe from evil is a top priority. But when you can’t handle detection and response in-house, it’s time to look for a partner who can help. In this Rapid7-commissioned 2022 Total Economic Impact™ (TEI) study from Forrester Consulting, you’ll learn how Rapid7’s Managed Detection and Response (MDR) service drove a significant Return on Investment (ROI) for a […]

Read more ›

A SANS 2021 Survey: Vulnerability Management – Impacts on Cloud and the Remote Workforce

This year’s Vulnerability Management Survey highlights some of the trends in vulnerability management based on the data we have gathered over the past two years. This webcast explores the results of our 2021 Vulnerability Management Survey, which examines key issues such as: • How organizations are discovering different types of vulnerabilities• Who is responsible for the different processes related to […]

Read more ›