SANS 2021 Ransomware Detection and Incident Response Report

Ransomware is becoming more prevalent every day, making it important to get prepared now.

A SANS 2021 Survey: Vulnerability Management – Impacts on Cloud and the Remote Workforce

This year’s Vulnerability Management Survey highlights some of the trends in vulnerability management based on the data we have gathered over the past two years.

AppSec Buyer’s Guide

In today’s world of complex, modern web applications, accurate and automated Dynamic Application Security Testing (DAST) tools are rare but do exist. What characteristics should you look for in a DAST tool to give you greater accuracy and ease of use?

Experity Relies on Rapid7 Managed Services to Scale Security Operations

In 2019, the two largest urgent care Electronic Medical Records (EMR) companies in the country came together to form Experity, a dynamic Health Information Technology company. With the merger came more employees in more locations working to develop and support Experity’s comprehensive urgent care operating system.

How to Get Started with Vulnerability Risk Management

Best practices for a risk reduction and management strategy that spans infrastructure and applications as compiled by our Advisory Services team.

ESG Report: The Impact of XDR in the Modern SOC

Threat detection and response is a core component of modern security programs, driving investment in tools to improve visibility, efficacy, and efficiency. As organizations commit to and extend EDR, NDR, or other security analytics solutions in support of broad threat detection and response programs, new opportunities arise for XDR.

451 Report: The Rise of Extended Detection and Response

Extended detection and response (XDR) is a relatively new term for an approach to security operations aimed at empowering teams with the technology to detect threats across multiple vectors. XDR is gaining momentum with end users and vendors/providers and holds potential to be a disruptor for both groups.

4 Ways XDR Levels Up Security Programs

Before networks, we password-protected computers. When the Department of Defense research project DARPA started connecting us, worms, viruses, and other malicious activity appeared. A NASA researcher invented the firewall. Hackers organized into groups and evolved faster than security solutions.