All Research Sponsored By:Rapid7

Confronting Security Fears to Control Cyber Risks Part 3
WEBCAST: To make cybersecurity a part of the business process and effectively implement necessary changes, the understanding and support of the C-suite is critical. Watch this webinar to discover what it takes to get the board on board with a 12-step plan to effectiveness.
Posted: 12 Apr 2023 | Premiered: Apr 12, 2023

TOPICS:  .NET

XDR for Beginners
WEBCAST: As advanced threats push security controls to their limits, SOC teams are struggling to detect and respond, and the XDR movement has promised to address this issue. Discover if XDR is a good fit for you, and what to expect from your XDR vendor, in this webinar.
Posted: 11 Apr 2023 | Premiered: Apr 11, 2023

TOPICS:  .NET

Confronting Security Fears to Control Cyber Risks Part 1
WEBCAST: The hyper-complexity of IT infrastructures and their related attacks by threat actors leaves C-suites longing for simplicity. But enabling simplicity requires clear direction built on a strong foundation, in a way that can be measured. Watch this webinar and access 8 steps to lead change in your cybersecurity operating model.
Posted: 08 Apr 2023 | Premiered: Apr 8, 2023

TOPICS:  .NET

Confronting Security Fears to Control Cyber Risks Part 2
WEBCAST: To effectively adapt during times of stress, businesses must align leadership and security teams to build a consistent approach. Well-designed protection level agreements (PLAs) are a great place to start, but they need to be monitored. Watch this webinar to learn how to create PLAs with KPIs and introduce accountability to your cybersecurity.
Posted: 07 Apr 2023 | Premiered: Apr 7, 2023

TOPICS:  .NET

Key Features in Building a Security Operations Center
EGUIDE: Whether a SOC is internally staffed or provided externally, building a security operations center means including some key technical capabilities engineered to cover the full lifecycle of a cybersecurity incident. Download this e-guide to learn about the must-have features when building a SOC.
Posted: 09 Jan 2020 | Published: 08 Jan 2020


Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
WHITE PAPER: Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012