Rapid7

Results: 177



#Item
121Computing / Data security / Rapid7 / Security controls / Security / Phishing / Penetration test / Computer security / Software / Computer network security

7 Steps to Successfully Implement SANS Top 20 Controls in your Organization If you think of the SANS Top 20 Controls as a minimum set of security requirements, then being able to show how your protocols map in compliance

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-03-04 12:10:49
122Computer network security / Software testing / Security / Risk / Rapid7 / Metasploit Project / Vulnerability / Federal Information Security Management Act / Risk management / Computer security / Software / Cyberwarfare

Rapid7® Nexpose® Ultimate is the only vulnerability management solution that prioritizes vulnerabilities, controls, and configurations across the modern network to make better risk management decisions, faster.

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-12-15 17:35:01
123Software / Software testing / Risk / Metasploit Project / Rapid7 / Vulnerability / Penetration test / Cisco Systems / Network security / Computer security / Computer network security / Cyberwarfare

At-A-Glance Cisco and Rapid7 Integration Cisco NGIPS and Its Awareness Technologies Integrate with Rapid7 for Enhanced Impact Analysis Information is critical when your network is under attack. In order to remediate aga

Add to Reading List

Source URL: www.cisco.com

Language: English
124

rapid7 united infographic_v4

Add to Reading List

Source URL: www.unitedsummit.org

- Date: 2014-12-17 16:14:21
    125Computer network security / Software testing / Metasploit Project / Rapid7 / Penetration test / Exploit / HD Moore / Software / Computer security / System software

    case study | Offensive Security Saves Time on Penetration Testing Engagements with Rapid7 Metasploit Pro Choosing Tools for the Security Consulting Practice Offensive Security offers performance-based security certifica

    Add to Reading List

    Source URL: www.rapid7.com

    Language: English - Date: 2014-06-06 17:54:09
    126Computer network security / Software testing / Hacking / Metasploit Project / Rapid7 / Exploit / Penetration test / Vulnerability / Attack / Computer security / Software / Cyberwarfare

    Metasploit Pro Certified Specialist: A New User’s Guide to Metasploit Pro What is it? You don’t need to be an expert pen-tester to identify security risks or confirm vulnerabilities with the aid of Metasploit Pro. Th

    Add to Reading List

    Source URL: www.rapid7.com

    Language: English - Date: 2014-12-15 17:35:01
    127Computer network security / Software testing / Rapid7 / Data privacy / Electronic commerce / Credit cards / Metasploit Project / Payment Card Industry Data Security Standard / McAfee / Software / Computer security / System software

    Vulnerability Management Case Study Permission Interactive Turns to Rapid7 for Help Enhancing its Security with Comprehensive Vulnerability Management E-Commerce Calls for Stronger Security In the world of e-commerce, P

    Add to Reading List

    Source URL: www.rapid7.com

    Language: English - Date: 2014-06-06 17:54:22
    128Computer network security / Software testing / Rapid7 / Metasploit Project / Exploit / Penetration test / Vulnerability scanner / Hacker / HD Moore / Software / Computer security / System software

    IT Security Case Study Rapid7 Metasploit Changes the Security Mindset at AutomationDirect AutomationDirect.com is a leading supplier of industrial automation equipment and associated components to manufacturers around t

    Add to Reading List

    Source URL: www.rapid7.com

    Language: English - Date: 2014-06-06 17:54:10
    129Computer network security / Software testing / Metasploit Project / Rapid7 / Penetration test / Exploit / Attack / Vulnerability / MSF / Computer security / Software / Cyberwarfare

    Metasploit 201: The Journeyman’s Guide to Metasploit What is it? Metasploit offers the information security professional a dense collection of attack exploits, payloads, post-exploitation tools and more. Making sense o

    Add to Reading List

    Source URL: www.rapid7.com

    Language: English - Date: 2014-06-06 17:54:09
    130Risk / Software testing / Rapid7 / Carnegie Mellon University / Social vulnerability / Vulnerability / Information security / Carnegie Mellon Silicon Valley / Software / Computer security / System software

    Vulnerability Management Case Study Rapid7 Nexpose Meets Carnegie Mellon University’s Requirements for Vulnerability Management, Co-Development and Higher Education Expertise Broadening Protection to Ensure Campus-Wid

    Add to Reading List

    Source URL: www.rapid7.com

    Language: English - Date: 2014-06-06 17:53:55
    UPDATE