Latest Articles

Beyond Blueprints – A Guide to Data Driven Construction

Harness the Power of Data to Transform Traditional Practices Most AEC professionals rely on years of experience and instinct. The advent of a centralized, cloud platform has led to a paradigm shift, with data now driving decisions. Egnyte’s Beyond Blueprints Ebook outlines how to embrace the change and harness the power of data for:• Secure […]

Read →

A SANS 2021 Survey: Threat Hunting in Uncertain Times

Discover insights from SANS experts on recent breaches, emerging threats, and how to mitigate risks going forward. Read the report to learn:• Takeaways from the SolarWinds attack to ensure software integrity• How machine learning is changing modern detection techniques, and how to implement it securely• The evolution of ransomware techniques, and how they can be […]

Read →

Ransomware Playbook: Actions You Can Take to Lower the Risk and Impact of This Kind of Attack

Many organizations are relying on Managed Detection & Response (MDR) providers to make sure they’re able to respond to threats like Ransomware as they emerge, without hiring any headcount. With an expected shortage of 2.5 million cybersecurity professionals it’s become critical to dedicate resources to better prepare for, detect, and respond to these types of […]

Read →

Cloud and Kubernetes – Removing the Kubernetes Security Blind Spots

Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platforms (CWPP) are foundations for good cloud security, but with more and more organizations adopting microservices and Kubernetes orchestration using cloud and hybrid cloud infrastructure, they are unwittingly expanding their significant attack surface. In this paper, we explore:• Why Kubernetes security can leave blind spots and […]

Read →

Securing Kubernetes With InsightCloudSec, Rapid7’s Cloud-Native Security Platform

Enterprises on a Kubernetes journey cannot apply the traditional security solutions that once protected on-site servers or VMs, as those are not designed for the unique development practices and distributed environments with which Kubernetes excels. Enterprises must expand their existing security programs to cover the entire Kubernetes software lifecycle with solutions that are intentionally built […]

Read →

2020 Vulnerability Intelligence Report 

Security, IT, and other teams tasked with vulnerability management and risk reduction frequently operate in high-urgency, high-stakes environments that require them to quickly separate signal from noise. When a new potential threat emerges, information security professionals often find themselves needing to translate vague descriptions and untested research artifacts into actionable intelligence for their own particular […]

Read →

How to Accelerate Risk Identification and Threat Remediation

Discover how security teams battle the complexities of the industry with the Rapid7 InsightPlatform. The InsightPlatform is a holistic, cloud-based platform that can help accelerate threat detection and remediation with expansive visibility and risk coverage to minimize the attack surface. Watch this 10 minute talk to learn how the InsightPlatform leverages analytics, context and automation […]

Read →

The Rise of Cloud-Based Security Analytics and Operations Technologies

How can CISOs address these issues and develop effective security analytics and operations processes? In order to get more insight into these trends, ESG surveyed 372 IT and cybersecurity professionals at organizations in North America (U.S. and Canada) responsible for evaluating, purchasing, and managing threat detection/response products, processes, and services. This eBook will cover how […]

Read →

Dark Reading Malware Threat Landscape Report 

Cybercriminals have ramped up attacks against organizations and are compromising them in greater numbers than a year ago. Phishing and viruses remain the most commonly detected attacks on enterprise networks, but ransomware and business email compromise (BEC) attacks could become the biggest threats over the next two years. Explore the Malware Threat Landscape report to […]

Read →
25,000+
Articles
500K+
Monthly Readers
300+
Sponsors
15+
Years of Insights