A large, New York City hospital with a complex environment consisting of more than 4,000 endpoints and a network that includes both on premise and remote users, is dealing with increasing volumes of data and a changing environment that requires around-the-clock security monitoring. The hospital’s cyber security team is responsible for protecting tens of thousands of highly-confidential patient records protected […]
Read more ›Articles By: Rapid7
TI MDR Case Study: DAMAC Properties
DAMAC, a luxury real estate developer in an expansion phase, began positioning themselves to become a global digital brand. Last year, DAMAC doubled its IT investments and established an information security program to support more than 1,500 end users spread across 40 offices As DAMAC built out the new security function, the 4-person security team faced a number of challenges; […]
Read more ›Cybersecurity Target Operating Model KPIs
Is your organization aspiring to become cybersecurity proficient? Creating a plan so that your business can adopt and maintain cybersecurity best practices is a must against the backdrop of global trade and the bad actors that threaten it. This Rapid7 Cybersecurity Target Operating Model (TOM) guide explores the Key Performance Indicators (KPIs) you’ll need to measure in order to implement […]
Read more ›Good Passwords for Bad Bots Research Report
New Research Shows Password Health is on Life Support With so much of the workforce operating on virtual machines in the cloud, it is critical to know just how secure the most common access points really are. This report takes a look at credentials associated with SSH and RDP — two of the most common remote access protocols — and […]
Read more ›MDR vs. The Inevitable: Breach Response Timelines From the Rapid7 SOC
Managed Detection and Response (MDR): Inside MDR Response Timelines & Tick Tocks In this new eBook you’ll find real life examples of common threats handled end-to-end by Rapid7 MDR. Discover the speed and accuracy with which SOC experts identify, contain, and respond to attacks for customers. IBM says it takes an average of 287 days to identify a breach and […]
Read more ›13 Tips for Overcoming the Cybersecurity Talent Shortage
600,000+ cybersecurity jobs are still vacant throughout the industry, causing a stressful situation for anyone running a detection and response program. Finding a security “unicorn” is near impossible and retaining them is even harder. If you’re struggling with this, you’re not alone – there are teams that suffer 100% turnover in a matter of years! In this eBook, we’ve pulled […]
Read more ›SANS 2022 Top New Attacks and Threat Report
The annual SANS Top New Attacks and Threat Report is out and full of some of the most critical data and best practices from some of the industry’s leading cybersecurity experts. Based each year on the SANS Institute’s “Five Most Dangerous Attacks” panel at RSA, the Top New Attacks and Threat Report looks at the trends in attacker behavior and […]
Read more ›The Total Economic Impact™ of Rapid7 Managed Detection and Response
Keeping your environment safe from evil is a top priority. But when you can’t handle detection and response in-house, it’s time to look for a partner who can help. In this Rapid7-commissioned 2022 Total Economic Impact™ (TEI) study from Forrester Consulting, you’ll learn how Rapid7’s Managed Detection and Response (MDR) service drove a significant Return on Investment (ROI) for a […]
Read more ›