All resources sponsored by:

Rapid7

12 Matches
Security Report for In-Production Web Applications
sponsored by Rapid7
RESEARCH CONTENT:This report was designed to uncover new areas of risk in application security, and confirm the presence of threats, vulnerabilities, and security incidents that teams have previously only suspected. Download the report to explore the top 5 most common application security incidents including cross-site scripting, SQL injections and more.
Posted: 07 May 2019 | Published: 07 May 2019
Get This Now


A Definitive Guide to Understanding and Meeting the CIS Critical Security Controls
sponsored by Rapid7
WHITE PAPER:The CIS controls supplement almost every other security framework and are a useful base for developing or assessing your security. However, with many methods out there for meeting them, implementing these controls can be a daunting project. This white paper will help you better understand how to approach and implement each of the key controls.
Posted: 08 Apr 2019 | Published: 08 Apr 2019
Get This Now


Security Information and Event Management (SIEM) Solutions
sponsored by Rapid7
WHITE PAPER:As the security landscape has evolved, SIEMs have evolved as well. However, many organizations struggle to deploy a new SIEM, achieve rapid success, and deliver a return on investment. In this white paper, learn how to evaluate SIEM platforms. Also, discover the top 3 capabilities every SIEM should provide.
Posted: 08 Apr 2019 | Published: 08 Apr 2019
Get This Now


The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER:Security operations are often slowed down by manual processes that would be better left to machines. As a result, security orchestration and automation is becoming an increasingly vital aspect of many organizations' security strategies. In this white paper, explore the benefits and value of security orchestration and automation.
Posted: 08 Apr 2019 | Published: 08 Apr 2019
Get This Now


Quarterly Threat Report Q4
sponsored by Rapid7
RESEARCH CONTENT:This issue of the Rapid7 Quarterly Threat Report takes a deep dive into the threat landscape for 2018 Q4 and looks more broadly at 2018 as a whole. The report provides an assessment of threat events by organization size and industry, and examines threat incident patterns. Download the report to explore highlights from the 2018 Q4 report.
Posted: 08 Apr 2019 | Published: 26 Feb 2019
Get This Now


Security Automation Best Practices
sponsored by Rapid7
WHITE PAPER:While processes make it possible to get a job done faster, creating ones that solve practical problems and result in measurable efficiency gains can be a time-consuming task. This is where security automation comes in. In this white paper, explore 4 best practices to help ensure your security team is successful with automation.
Posted: 05 Apr 2019 | Published: 05 Apr 2019
Get This Now


Security Orchestration and Automation Solutions
sponsored by Rapid7
WHITE PAPER:One of the fastest growing security trends right now is the adoption of security orchestration and automation platforms. In this white paper, learn why security orchestration and automation are becoming increasingly essential tools to improve agility, responsiveness, accuracy, and efficiency.
Posted: 05 Apr 2019 | Published: 05 Apr 2019
Get This Now


Application Security Buyer's Guide
sponsored by Rapid7
WHITE PAPER:What characteristics should you look for in a Dynamic Application Security Testing (DAST) tool to give you greater accuracy and ease of use? Download this buyer's guide for 15 questions to ask yourself and your DAST vendor.
Posted: 04 Apr 2019 | Published: 04 Apr 2019
Get This Now


Industry Cyber Exposure Report
sponsored by Rapid7
RESEARCH CONTENT:Measuring the cost and concentration of weaknesses in the public-facing configuration of internet-connected services is increasingly important in the face of growing cybersecurity threats. In this research report, explore Rapid7 Lab's key findings as they measured the current levels of exposure and resiliency in 453 of the 2017 Fortune 500 list.
Posted: 04 Apr 2019 | Published: 11 Dec 2018
Get This Now


Prepare for Battle: Building an Incident Response Plan
sponsored by Rapid7
EBOOK:Laying a foundation for threat response allows IT organizations and their partners to respond to incidents as effectively and efficiently as possible. Creating and testing an incident response (IR) plan gives you that foundation. In this e-book, explore 4 steps to building and testing a successful IR plan.
Posted: 04 Apr 2019 | Published: 04 Apr 2019
Get This Now


Evaluating Vulnerability Assessment Solutions
sponsored by Rapid7
WHITE PAPER:Exploiting weaknesses to infect systems is a common first step for security attacks and breaches. Finding and fixing these vulnerabilities is a proactive defensive measure essential to any security program. In this white paper, explore 4 essential steps to execute an effective proof of concept for a vulnerability assessment tool.
Posted: 03 Apr 2019 | Published: 03 Apr 2019
Get This Now


Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
sponsored by Rapid7
WHITE PAPER:Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012
Get This Now


12 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement