Why scanning more often could deliver surprising benefits you may not have considered. Can I just scan once per year, like with a penetration test? Penetration tests are uniquely effective in uncovering highly complex vulnerabilities in web applications: those which may require detailed human awareness and context in order to detect. However, whilst irreplaceable, penetration tests can also be relatively … Read More
UBA vs UEBA and SIEM
What is UEBA? What is the difference between UBA vs UEBA and how does it fit in with SIEM? User and Entity Behaviour Analytics (UEBA) focuses on analysing activity. Specifically user behaviour, device usage, and security events within your network environment. It helps companies detect potential insider threats and compromised accounts. The concept has been around for some time. It … Read More
Secure Your Cloud Infrastructure For Remote Workers
As working from home becomes more long-term, it’s important to secure your cloud infrastructure for remote workers. Cloud Infrastructure allows for great speed and ease of deployment. New infrastructure can be deployed in minutes. The rate of change in cloud infrastructure is far quicker than with on-premise and it is so easy and quick to deploy. This is enabling businesses … Read More
Modern Cloud SIEM Solutions from Rapid7
As everything is moving to the cloud, Rapid7 explain why modern SIEM is in the cloud and what benefits you can expect from a cloud SIEM. Modern cloud SIEM solutions enable three new use cases In the past, SIEM has been most valuable around: Correlation: Give me context, and help me investigate alarms triggered by my stack Compliance: Help me prove that … Read More
The Forrester Wave™: Vulnerability Risk Management, Q4 2019
Rapid7 is named a leader, receiving the highest score possible in nine criteria for its InsightVM, vulnerability risk management tool. Forrester cites 14 key areas buyers should consider when evaluating VRM solutions. Rapid7’s own customers tell us that the following 5 capabilities are especially critical… 5 Capabilities Your Vulnerability Risk Management Solution Needs: 1 Visibility of your complete IT environment … Read More
Vulnerability Management & Cloud Security
Cloud Security is becoming a top priority. Infrastructure as a Service (IaaS) is now the fastest growing area of the cloud. This is due to the speed, cost and reliability with which organisations can create and deploy applications, according to McAfee’s latest report –‘Cloud Native – Infrastructure as a Service Adoption & Risk Report’. Unfortunately, the results of their survey … Read More
Traditional Vision Of Vulnerability Management Is Outdated
A decade ago, most enterprises could get away with addressing vulnerability management in silos. One team would scan servers and desktop computers on the enterprise network. They would look for misconfigurations in systems and vulnerabilities in commercial software applications. When problems were discovered, they were thrown over the wall for system administrators and operations groups to fix. Application developers were … Read More