ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Rapid7

  • Security Report for In-Production Web Applications

    This report was designed to uncover new areas of risk in application security, and confirm the presence of threats, vulnerabilities, and security incidents that teams have previously only suspected. Download the report to explore the top 5 most common application security incidents including cross-site scripting, SQL injections and more.

  • A Definitive Guide to Understanding and Meeting the CIS Critical Security Controls

    The CIS controls supplement almost every other security framework and are a useful base for developing or assessing your security. However, with many methods out there for meeting them, implementing these controls can be a daunting project. This white paper will help you better understand how to approach and implement each of the key controls.

  • Security Information and Event Management (SIEM) Solutions

    As the security landscape has evolved, SIEMs have evolved as well. However, many organizations struggle to deploy a new SIEM, achieve rapid success, and deliver a return on investment. In this white paper, learn how to evaluate SIEM platforms. Also, discover the top 3 capabilities every SIEM should provide.

  • The ROI of Security Orchestration and Automation

    Security operations are often slowed down by manual processes that would be better left to machines. As a result, security orchestration and automation is becoming an increasingly vital aspect of many organizations' security strategies. In this white paper, explore the benefits and value of security orchestration and automation.

  • Quarterly Threat Report Q4

    This issue of the Rapid7 Quarterly Threat Report takes a deep dive into the threat landscape for 2018 Q4 and looks more broadly at 2018 as a whole. The report provides an assessment of threat events by organization size and industry, and examines threat incident patterns. Download the report to explore highlights from the 2018 Q4 report.

  • Security Automation Best Practices

    While processes make it possible to get a job done faster, creating ones that solve practical problems and result in measurable efficiency gains can be a time-consuming task. This is where security automation comes in. In this white paper, explore 4 best practices to help ensure your security team is successful with automation.

  • Security Orchestration and Automation Solutions

    One of the fastest growing security trends right now is the adoption of security orchestration and automation platforms. In this white paper, learn why security orchestration and automation are becoming increasingly essential tools to improve agility, responsiveness, accuracy, and efficiency.

  • Application Security Buyer's Guide

    What characteristics should you look for in a Dynamic Application Security Testing (DAST) tool to give you greater accuracy and ease of use? Download this buyer's guide for 15 questions to ask yourself and your DAST vendor.

  • Industry Cyber Exposure Report

    Measuring the cost and concentration of weaknesses in the public-facing configuration of internet-connected services is increasingly important in the face of growing cybersecurity threats. In this research report, explore Rapid7 Lab's key findings as they measured the current levels of exposure and resiliency in 453 of the 2017 Fortune 500 list.

  • Prepare for Battle: Building an Incident Response Plan

    Laying a foundation for threat response allows IT organizations and their partners to respond to incidents as effectively and efficiently as possible. Creating and testing an incident response (IR) plan gives you that foundation. In this e-book, explore 4 steps to building and testing a successful IR plan.

  • Evaluating Vulnerability Assessment Solutions

    Exploiting weaknesses to infect systems is a common first step for security attacks and breaches. Finding and fixing these vulnerabilities is a proactive defensive measure essential to any security program. In this white paper, explore 4 essential steps to execute an effective proof of concept for a vulnerability assessment tool.

  • Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance

    Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.