Posts tagged Whiteboard Wednesday

3 min Whiteboard Wednesday

How to Gain Security Visibility into a Modern Environment

In our latest installment of Whiteboard Wednesday, we break down the step-by-step approach you can take to gain visibility across a modern environment and the main areas you should focus on.

2 min Whiteboard Wednesday

Whiteboard Wednesday: Common Vulnerabilities as Personified by Halloween Costumes

As a security professional, you don’t need a haunted house to feel spooked this Halloween—just start exploring your environment in search of vulnerabilities.

4 min InsightConnect

Security Orchestration and Automation: Not Just for Mature Organizations

Think that security, orchestration, and automation (SOAR) is only for mature organizations? Think again. Here are some ways your company can benefit from SOAR solutions.

1 min Whiteboard Wednesday

Whiteboard Wednesday: How to Implement A Phishing Awareness Training Plan in 5 Steps

There’s no silver bullet to combating protecting your organization from phishing attacks [https://www.rapid7.com/solutions/phishing-protection/] today. The only comprehensive approach leverages a combination of methods, many of which we’ve covered in parts 1 [https://www.rapid7.com/resources/wbw-anti-phishing/] and 2 [https://www.rapid7.com/resources/wbw-phishing-protection/] of our three-part phishing Whiteboard Wednesday series. Phishing is a human problem, and part of the solution is to prop

1 min Honeypots

Whiteboard Wednesday: Your 6-Minute Recap of Q1 2018’s Threat Landscape

Gotten a chance to read Rapid7’s Quarterly Threat Report for 2018 Q1 [https://www.rapid7.com/info/threat-report/2018-q1-threat-report/]? If not (or if you’re more of an auditory learner), we’ve put together a 6-minute recap video of the major findings. In our Quarterly Threat Reports [https://www.rapid7.com/info/threat-report/], our security researchers provide a wide-angle view of the threat landscape by leveraging intelligence from the Rapid7 Insight platform [https://www.rapid7.com/products/

1 min Phishing

Whiteboard Wednesday: The Two Components of Phishing Protection Your Security Strategy Needs

You’re no stranger to the threat of phishing. It’s everywhere, and plays a role in 92% of breaches, according to the Verizon Data Breach Digest [https://www.rsaconference.com/writable/presentations/file_upload/lab4-r12_data-breach-digest-perspectives-on-the-human-element_copy1.pdf] . Last month, during the first installment of our phishing Whiteboard Wednesday series, we talked about the key components of an anti-phishing program [https://www.rapid7.com/resources/wbw-anti-phishing/], and this mo

1 min Whiteboard Wednesday

How a breached vendor impacts your organization's security - this week's Whiteboard Wednesday

The traditional concept of the security perimeter is long-outdated, and as recent headline-grabbing data breaches have shown, we must also monitor to the corporate supply chain as a source of potential security issues down the road. And as business systems become increasingly interconnected, the risks can grow as well. In this week's Whiteboard Wednesday, Security Engineer Justin Pagano digs a little deeper into this issue and details: * How a vendor in your supply chain could (inadvertently

1 min Whiteboard Wednesday

Whiteboard Wednesday: Insider Threat Programs - How To Get Started

Do you need an insider threat program? It's a good question - one that more companies are considering as compromised users become an increasingly popular attack vector, and malicious user behavior becomes more prevalent. In this week's Whiteboard Wednesday video, we weigh some options on why you might want to consider an insider threat program, as well as give recommendations on steps you can take to start your own. As always, if there's a topic you'd like to see us cover in a Whiteboard Wed

1 min Whiteboard Wednesday

Whiteboard Wednesday - Pen Testing for Productivity

This week's Whiteboard Wednesday finds Chris Kirsch, our Senior Product Marketing Manager for Metasploit, explaining how productivity features within pen testing tools can save you some significant time. We here at Rapid7 obviously love open source products, but a common issue with most of them is that they don't do a great job of focusing on efficiency. If you add the lack of network security people in the market, and the fact that 46% of organizations are planning on increasing their security

1 min Nexpose

Moving from HML (High, Medium, Low) Hell to Security Heaven – Whiteboard Wednesdays

At last check there are about 22 new vulnerabilities being published and categorized every single day (see National Vulnerability Database web site - http://nvd.nist.gov/). In total, the National Vulnerability Database now contains more than 53,000 vulnerabilities. No wonder security professionals are overwhelmed with the sheer volume of vulnerabilities in their daily practices. At the same time, the prioritization schema that many organizations use are quite basic and are either proprietary or