www.rapid7.com
Open in
urlscan Pro
143.204.98.112
Public Scan
URL:
https://www.rapid7.com/blog/post/2022/03/16/the-vm-lifecycle-how-we-got-here-and-where-were-going/?utm_source=email&utm...
Submission: On March 29 via api from US — Scanned from DE
Submission: On March 29 via api from US — Scanned from DE
Form analysis
6 forms found in the DOM/search
<form action="/search">
<div class="container flex flex-jc-c flex-ai-c">
<div class="search-content flex flex-jc-fs flex-ai-c"><i class="r7-icon r7-icon-search-magnify"></i><input type="search" class="search-input" name="q" placeholder="Search"><input type="submit" class="search-submit button blue"
value="Search"><a id="btnSearchCloseMobile" class="search-close"><i class="r7-icon r7-icon-delete-x"></i></a></div>
</div>
</form>
/search
<form action="/search" class="search-content flex flex-jc-c flex-ai-c"><i class="r7-icon r7-icon-search-magnify"></i><input type="search" class="search-input" name="q" placeholder="Search"><input type="submit" class="search-submit button blue"
value="Search"><a class="search-close"><i class="r7-icon r7-icon-delete-x"></i></a></form>
/search/
<form action="/search/">
<input class="sb-search-input" placeholder="Search all the things" type="search" value="" name="q" id="search">
<input class="sb-search-submit" type="submit" value="">
</form>
<form id="contactModal" class="formBlock freemail mkto contactModal" data-block-name="Contact Form Block">
<div id="intro">
<div id="thankyouText" style="display:none;" class="messageBox green">
<h4><span class="success">Success!</span> Thank you for submission. We will be in touch shortly.</h4>
</div>
<div id="errorText" style="display:none;" class="messageBox red">
<h4><span class="error">Oops!</span> There was a problem in submission. Please try again.</h4>
</div>
<div>
<h2>Contact Us</h2>
</div>
</div>
<fieldset>
<p id="fieldInstruction" class="instructions">All fields are mandatory</p>
<dl class="dl-1">
<dd>
<label for="firstName">First Name</label>
<input id="firstName" type="text" name="firstName" tabindex="1">
</dd>
</dl>
<dl class="dl-2">
<dd>
<label for="lastName">Last Name</label>
<input id="lastName" type="text" name="lastName" tabindex="2">
</dd>
</dl>
<dl class="dl-3">
<dd>
<label for="jobTitle">Job Title</label>
<input id="jobTitle" type="text" name="jobTitle" tabindex="3">
</dd>
</dl>
<dl class="dl-4">
<dd>
<label for="jobLevel">Job Level</label>
<select name="jobLevel" id="jobLevel" tabindex="4" class="normalSelect dropdownSelect">
<option value="0" class="left_opt_pad">Job Level</option>
<option value="Analyst" class="left_opt_pad">Analyst</option>
<option value="System/Security Admin" class="left_opt_pad">System/Security Admin</option>
<option value="Manager" class="left_opt_pad">Manager</option>
<option value="Director" class="left_opt_pad">Director</option>
<option value="VP" class="left_opt_pad">VP</option>
<option value="CxO" class="left_opt_pad">CxO</option>
<option value="Student" class="left_opt_pad">Student</option>
<option value="Other" class="left_opt_pad">Other</option>
</select>
</dd>
</dl>
<dl class="dl-5">
<dd>
<label for="companyName">Company</label>
<input id="companyName" type="text" name="companyName" tabindex="5">
</dd>
</dl>
<dl class="dl-6">
<dd>
<label for="email">Email</label>
<input id="email" type="text" name="email" tabindex="6">
</dd>
</dl>
<dl class="dl-7">
<dd>
<div class="intl-phone">
<label for="phone">Phone</label>
<div class="flag-container">
<div class="selected-flag">
<div class="iti-flag"></div>
</div>
<ul class="country-list"></ul>
</div>
<input id="phone" type="text" name="phone" tabindex="7">
</div>
</dd>
</dl>
<dl class="dl-8">
<dd>
<label for="country">Country</label>
<select name="country" id="country" tabindex="8" class="form_SelectInstruction normalSelect" onchange="updateCountryData('#contactModal');"></select>
</dd>
</dl>
<dl class="dl-9">
<dd>
<label for="state">State</label>
<select name="state" id="state" tabindex="9" class="form_SelectInstruction normalSelect dropdownSelect"></select>
</dd>
</dl>
<dl class="clearfix expand dl-10">
<dd>
<label for="state">Reason for Contact</label>
<select name="contactType" id="contactType" tabindex="10" class="normalSelect dropdownSelect">
<option value="0" class="left_opt_pad">- Select -</option>
<option value="20437" data-subopts="20437|Request a Demo;20438|Get Pricing Info;20439|General" class="left_opt_pad">I'd like to learn more about vulnerability management</option>
<option value="20440" data-subopts="20440|Request a Demo;20441|Get Pricing Info;20442|General" class="left_opt_pad">I'd like to learn more about application security</option>
<option value="20443" data-subopts="20443|Request a Demo;20444|Get Pricing Info;20445|General" class="left_opt_pad">I'd like to learn more about incident detection and response</option>
<option value="20433" data-subopts="20433|Request a Demo;20446|Get Pricing Info;20447|General" class="left_opt_pad">I'd like to learn more about cloud security</option>
<option value="20448" data-subopts="" class="left_opt_pad">I'd like to learn more about Rapid7 professional or managed services</option>
<option value="20450" data-subopts="" class="left_opt_pad">I'd like to learn more about visibility, analytics, and automation</option>
<option value="20434" data-subopts="20434|Request a Demo;20435|Get Pricing Info;20436|General" class="left_opt_pad">I'd like to learn more about building a comprehensive security program</option>
<option value="21019" data-subopts="21019|Request a demo;21021|Get Pricing Info;21020|General" class="left_opt_pad">I'd like to learn more about threat intelligence.</option>
</select>
</dd>
</dl>
<dl class="clearfix expand dl-11" id="contactTypeSecondaryParent" style="display:none;">
<dd>
<label for="Reason">Reason for Contact</label><select name="contactTypeSecondary" id="contactTypeSecondary" tabindex="11" class="normalSelect dropdownSelect">
<option value="0" class="left_opt_pad">- Select -</option>
</select>
</dd>
</dl>
<dl class="expand dl-12" id="consultant" style="display: none;">
<input id="consultantField" type="checkbox" class="r7-check" tabindex="12">
<label for="consultantField">I am a consultant, partner, or reseller.</label>
<br>
<br>
</dl>
<dl class="expand checkboxContainer sub-center dl-13" id="optout" style="display:none;">
<dd>
<input id="explicitOptOut" type="checkbox" class="r7-check" tabindex="13">
<label for="explicitOptOut">I do not want to receive emails regarding Rapid7's products and services.</label>
</dd>
<div class="disc">
<p>Issues with this page? Please email <a href="mailto:info@rapid7.com">info@rapid7.com</a>. Please see updated <a href="/link/678c9fbe33a749f8b614a7be0e36e7ee.aspx">Privacy Policy</a></p>
</div>
</dl>
<dl class="expand dl-14">
<button class="submit button btn-primary mdBtn" tabindex="11">Submit</button>
</dl>
<input type="hidden" id="formName" value="ContactPage">
<input type="hidden" id="contactUsFormURL" value="https://www.rapid7.com/blog/post/2022/03/16/the-vm-lifecycle-how-we-got-here-and-where-were-going/?utm_source=email&utm_medium=marketo&utm_campaign=ivm-newsletter22">
<input type="hidden" id="landorExpand" value="land">
</fieldset>
</form>
<form id="mktoForm_4144" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 1601px;">
<style type="text/css">
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton {
color: #fff;
border: 1px solid #75ae4c;
padding: 0.4em 1em;
font-size: 1em;
background-color: #99c47c;
background-image: -webkit-gradient(linear, left top, left bottom, from(#99c47c), to(#75ae4c));
background-image: -webkit-linear-gradient(top, #99c47c, #75ae4c);
background-image: -moz-linear-gradient(top, #99c47c, #75ae4c);
background-image: linear-gradient(to bottom, #99c47c, #75ae4c);
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:hover {
border: 1px solid #447f19;
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:focus {
outline: none;
border: 1px solid #447f19;
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:active {
background-color: #75ae4c;
background-image: -webkit-gradient(linear, left top, left bottom, from(#75ae4c), to(#99c47c));
background-image: -webkit-linear-gradient(top, #75ae4c, #99c47c);
background-image: -moz-linear-gradient(top, #75ae4c, #99c47c);
background-image: linear-gradient(to bottom, #75ae4c, #99c47c);
}
</style>
<div class="mktoFormRow" input-name="parent-Email">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
<div class="mktoOffset" style="width: 10px;"></div>
<div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 110px;">Your Email</label>
<div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email" name="Email" placeholder="" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired"
aria-required="true" style="width: 150px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow" input-name="parent-noinput">
<div class="mktoPlaceholder mktoPlaceholderHtmlText_2018-05-24T14 942Z"></div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow" input-name="parent-AnonymousIP"><input type="hidden" name="AnonymousIP" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow" input-name="parent-browseLang"><input type="hidden" name="browseLang" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow" input-name="parent-InferredCountry"><input type="hidden" name="InferredCountry" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow" input-name="parent-LeadSource"><input type="hidden" name="LeadSource" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow" input-name="parent-ClickSource"><input type="hidden" name="ClickSource" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow" input-name="parent-preferenceBlogDigest"><input type="hidden" name="preferenceBlogDigest" class="mktoField mktoFieldDescriptor mktoFormCol" value="true" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow" input-name="parent-preferencesLastUpdated"><input type="hidden" name="preferencesLastUpdated" class="mktoField mktoFieldDescriptor mktoFormCol" value="{{system.Date}}" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoButtonRow"><span class="mktoButtonWrap mktoSimple" style="margin-left: 120px;"><button type="submit" class="mktoButton">Subscribe</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
value="4144"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="411-NAK-970">
</form>
<form novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;">
</form>
Text Content
QUICK COOKIE NOTIFICATION This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here. If you continue to browse this site without changing your cookie settings, you agree to this use. I AGREE, LET’S GO! -------------------------------------------------------------------------------- View Cookie Policy for full details * Products * Insight Platform Solutions * XDR & SIEM INSIGHTIDR * Threat Intelligence THREAT COMMAND * Vulnerability Management INSIGHTVM * Dynamic Application Security Testing INSIGHTAPPSEC * Orchestration & Automation INSIGHTCONNECT * Cloud Security INSIGHTCLOUDSEC * More Solutions * Penetration Testing METASPLOIT * On-Prem Vulnerability Management NEXPOSE * Application Monitoring & Protection TCELL Insight PlatformFree Trial * Services * MANAGED SERVICES * Detection and Response 24/7 MONITORING & REMEDIATION FROM MDR EXPERTS * Vulnerability Management PERFECTLY OPTIMIZED RISK ASSESSMENT * Application Security SCAN MANAGEMENT & VULNERABILITY VALIDATION * OTHER SERVICES * Security Advisory Services PLAN, BUILD, & PRIORITIZE SECURITY INITIATIVES * Product Consulting QUICK-START & CONFIGURATION * Training & Certification SKILLS & ADVANCEMENT * Penetration Services TEST YOUR DEFENSES IN REAL-TIME * IoT Security Testing SECURE EVERYTHING CONNECTED TO A CONNECTED WORLD * Premium Support PRIORITY HELP & FASTER SOLUTIONS * Support & Resources * SUPPORT * Support Portal CONTACT CUSTOMER SUPPORT * Product Documentation EXPLORE PRODUCT GUIDES * Release Notes DISCOVER THE LATEST PRODUCT UPDATES * Contact Us TALK TO SALES * RESOURCES * Fundamentals FOUNDATIONAL SECURITY KNOWLEDGE * Blog THE LATEST INDUSTRY NEWS AND SECURITY EXPERTISE * Resources Library E-BOOKS, WHITE PAPERS, VIDEOS & BRIEFS * Extensions Library PLUGINS, INTEGRATIONS & DEVELOPER COMMUNITY * Partners RAPID7 PARTNER ECOSYSTEM * Webcasts & Events UPCOMING OPPORTUNITIES TO CONNECT WITH US * Vulnerability & Exploit Database SEARCH THE LATEST SECURITY RESEARCH * Research * en * English * Deutsch * 日本語 * Sign In Blog * Select * Vuln. Management * Detection & Response * App Security * Research * Cloud Security * SOAR * Metasploit * More... Try Now * Products * Insight Platform Solutions * XDR & SIEM INSIGHTIDR * Threat Intelligence THREAT COMMAND * Vulnerability Management INSIGHTVM * Dynamic Application Security Testing INSIGHTAPPSEC * Orchestration & Automation INSIGHTCONNECT * Cloud Security INSIGHTCLOUDSEC * More Solutions * Penetration Testing METASPLOIT * On-Prem Vulnerability Management NEXPOSE * Application Monitoring & Protection TCELL Insight PlatformFree Trial * Services * MANAGED SERVICES * Detection and Response 24/7 MONITORING & REMEDIATION FROM MDR EXPERTS * Vulnerability Management PERFECTLY OPTIMIZED RISK ASSESSMENT * Application Security SCAN MANAGEMENT & VULNERABILITY VALIDATION * OTHER SERVICES * Security Advisory Services PLAN, BUILD, & PRIORITIZE SECURITY INITIATIVES * Product Consulting QUICK-START & CONFIGURATION * Training & Certification SKILLS & ADVANCEMENT * Penetration Services TEST YOUR DEFENSES IN REAL-TIME * IoT Security Testing SECURE EVERYTHING CONNECTED TO A CONNECTED WORLD * Premium Support PRIORITY HELP & FASTER SOLUTIONS * Support & Resources * SUPPORT * Support Portal CONTACT CUSTOMER SUPPORT * Product Documentation EXPLORE PRODUCT GUIDES * Release Notes DISCOVER THE LATEST PRODUCT UPDATES * Contact Us TALK TO SALES * RESOURCES * Fundamentals FOUNDATIONAL SECURITY KNOWLEDGE * Blog THE LATEST INDUSTRY NEWS AND SECURITY EXPERTISE * Resources Library E-BOOKS, WHITE PAPERS, VIDEOS & BRIEFS * Extensions Library PLUGINS, INTEGRATIONS & DEVELOPER COMMUNITY * Partners RAPID7 PARTNER ECOSYSTEM * Webcasts & Events UPCOMING OPPORTUNITIES TO CONNECT WITH US * Vulnerability & Exploit Database SEARCH THE LATEST SECURITY RESEARCH * Research * en * English * Deutsch * 日本語 * Sign In * Blog * Vuln. Management * Detection & Response * App Security * Research * Cloud Security * SOAR * Metasploit * More... Try Now THE VM LIFECYCLE: HOW WE GOT HERE, AND WHERE WE’RE GOING * Mar 16, 2022 * 4 min read * Devin Krugly * * * Last updated at Wed, 16 Mar 2022 14:13:07 GMT Written in collaboration with Joel Ashman The immutable truth that vulnerability management (VM) programs have long adhered to is that successful programs should follow a consistent lifecycle. This concept is simply a series of phases or steps that have a logical sequence and are repeated according to an organization’s VM program cadence. A lifecycle gives a VM program a central illustrative model, defining the high-level series of activities that must be performed to reduce attack surface risk — the ultimate goal of any VM program. This type of model provides a uniform set of expectations for all stakeholders, who are often cross-functional and geographically dispersed. It can also be used as a diagnostic tool to identify bottlenecks, inefficiencies, or gaps (more on that later). There are many lifecycle model prototypes in circulation, and they are generally comparable and iterative in nature. They break large-bucket activities into four, five, or six phases of work which describe the effort needed to prepare and scan for vulnerabilities or configuration weaknesses, assess or analyze, distribute, and ultimately address those findings through remediation or another risk treatment plan (i.e. exceptions, retire a server, etc). While any one specific lifecycle will (and should) vary by organization and the specific tools in use, there are some fundamental steps or phases that remain consistent. This educational series will focus on introducing those fundamental building blocks, followed by practical demonstrations on how best to leverage Rapid7 solutions and services to accelerate your program. In this first installment of a multipart blog and webinar series, we will explore the concept of a VM program lifecycle and provide practical guidance and definition for what many consider the first of the iterative VM lifecycle phases – often referred to as “discover”, “understand,” or even “planning.” A (VERY) BRIEF HISTORY OF THE VM LIFECYCLE But let’s return to the lifecycle concept for just a moment. Having just a couple of small variables in my life flip the other way, I could have ended up a forensic historian or anthropologist. Those interests have paid dividends time and time again: to understand where you want to go, you have to understand how you got here. The need for vulnerability management has existed since long before it had a title. It falls under what could be argued is the most important cybersecurity discipline: security hygiene. If you want nice teeth, you have to have good dental hygiene (identify cavities and perform regular maintenance). Similarly, organizations that require secure digital infrastructure must regularly assess and identify weaknesses (vulnerabilities, defects, improper configs) and then address those weaknesses through updates or other mitigation. Two key points about how we got here: 1. We all know the evolution of a few worms and viruses in ARPANET in the 1970s, to the much more intentionally crafted viruses targeting operating systems of the 1980s, to today’s this-ware or that-ware that have malintent baked right into the very fibers of their assembly language. In computing, the potential for misuse in the form of vulnerabilities has been with us from the start. 2. A subtle but countervailing force has slowly but surely crept forward to stem, reflect, contain, and now often eradicate the intentions of bad actors. We the Defenders, the Protectors, the Stewards of Vulnerability Management will not be dissuaded from our obligation to manage cyber risk: to safeguard secrets, to shield corporate data, and to protect the networks that allow us to share pictures of the animals living in our homes and purchase large quantities of toilet paper online. Let’s not forget the prevention of abuse of individual identity — stopping those thieves from taking vacation savings, using those funds for their own vacation, and posting pictures on a Caribbean island from their Instagram account (true story). We are keen to meet and overcome the challenges of modern attackers and modern infrastructure and applications (with all its containers and microservices), both now and into the bright and hopefully still shiny future. We have met this call and at times faltered, but we have never been discouraged — and a key element that has supported us Protectors has been the lifecycle artifact. A conceptual model that conveys the continuous nature of the management of vulnerability risk and provides steadfast guidance for all stakeholders. THE LIFECYCLE HOLDS TRUE Vulnerability risk management is a team sport. It is only through careful, judicious, and sometimes aggravatingly laborious detail that a full lifecycle successfully completes. This may entail the same conversation happening no less than 5 to 8 times with the same audience. Even if the last time you said, “I didn’t ever want to have this conversation ever again.” Amidst all the chaos and confusion, the VM lifecycle is an immutable truth. Its methods may evolve and its technology take a dramatically different approach, but it will remain true. The compendium to this blog is a webinar, which you can watch here . Both are the first in our series to freshen up perceptions and maybe introduce a few new concepts by exploring the various phases and activities that are fundamental pillars for a strong VM program and its execution. In addition, we have created a worksheet as a guide to facilitate efficient collection of information to build a VM stakeholder map. You can access the worksheet and download it here. Join me for the next in the series to dive deeper into the initial stages or phases, or whatever preferred term you use, of the VM lifecycle. Additional reading: * InsightVM Scanning: Demystifying SSH Credential Elevation * An Inside Look at CISA’s Supply Chain Task Force * Log4Shell 2 Months Later: Security Strategies for the Internet's New Normal * Log4Shell Strategic Response: 5 Practices for Vulnerability Management at Scale NEVER MISS A BLOG Get the latest stories, expertise, and news about security today. Subscribe POST TAGS * Vulnerability Management * Security Strategy SHARING IS CARING * * * AUTHOR Devin Krugly View Devin's Posts Please enable JavaScript to view the comments powered by Disqus. TOPICS * Metasploit (761) * Vulnerability Management (391) * Detection and Response (340) * Research (242) * Application Security (138) * Cloud Security (68) POPULAR TAGS * Metasploit * Logentries * IT Ops * Vulnerability Management * Detection and Response * Metasploit Weekly Wrapup * Automation and Orchestration * Nexpose * Research * Incident Detection * Exploits * Komand * Incident Response * InsightIDR * Penetration Testing * .net * 2022 Planning * 7 Rapid Questions * Alcide * Android * Antivirus * API * Apple * Application Security * AppSpider * Artificial Intelligence * Attack surface analysis * Attack Surface Management * Authentication * Automated Remediation * Automation and Orchestration * Automation Remediation * Awards * AWS * Azure * Black Friday * Botnets * Breach Preparedness * Breach Response News * Capture the Flag * Car Hacking * Career Development * Chrome * CIS Controls * CISOs * Cloud Infrastructure * Cloud Security * CMMC * Compliance * Confessions of a Former CISO * Consulting Services * COVID Health * COVID-19 * Critical Infrastructure * Cryptocurrency * Customer Perspective * Cyber Monday * Cybersecurity * DAST * Demystifying XDR * Denial of Service (DoS) * Deployments * Detection and Response * DevOps * DevSecOps * Email Security * Emergent Threat Response * Emerging Threats * End of Life * Endpoints * episode-10 * episode-11 * episode-12 * episode-16 * episode-9 * Events * Expert Commentary * Exploits * Extended Detection and Response * Finance * Firefox * Flash * Fundamentals * Gartner * GDPR * Google * Government * Guest Perspective * Guest Post * Hacking * Hacky Holidays 2021 * Haxmas * Higher Education * HIPAA * Home Automation * Honeypots * ICER * Identity Access Management * incident * Incident Detection * Incident Response * Industry Cyber-Exposure Report * Industry Cyber-Exposure Report (ICER) * Infosec * Insight platform * InsightAppSec * InsightCloudSec * InsightConnect * InsightIDR * InsightOps * InsightPhishing * InsightVM * Internet Explorer * IntSights * IoT * IT Ops * Java * Javascript * Kill Chain * Komand * Kubernates Security * Kubernetes * L&D * Labs * Legal * Linux * Log Management * Log Search * log4j * Log4Shell * Logentries * Lost Bots * Machine Learning * Malware * Managed Detection and Response * Managed Security Service Providers * Manual Regex Editor * MDR * MDR Must-Haves * Medical * Metasploit * Metasploit Weekly Wrapup * Microsoft * MITRE ATT&CK * MSSP * National / Industry / Cloud Exposure Report (NICER) * National Cybersecurity Awareness Month * National Exposure * NCSAM * Network Traffic Analysis * Networking * News * Nexpose * NIST * Open Source * OSCP * OWASP Top 10 2021 * Patch Tuesday * Payload * PCI * Penetration Testing * Permissions * Phishing * Podcast * Product Updates * Project Heisenberg * Project Sonar * Public Policy * Python * Quarterly Threat Report * R7 Book Club * Ransomware * Rapid7 Culture * Rapid7 Disclosure * Rapid7 Discuss * Rapid7 Perspective * Rapid7 Support * Red Team * Release Notes * Remote Working * Reports * Research * RSA * Ruby on Rails * Russia-Ukraine Conflict * SAML * SecOps * Security Assertion Markup Language * Security Nation * Security Operations Center (SOC) * Security Strategy * SIEM * Skills * Snyk * SOAR * Social Engineering * Supply Chain Attacks * Supply Chain Security * tCell * The Forecast Is Flipped * Third-Party Disclosure * This One Time on a Pen Test * THOTCON * Threat Intel * Threat Intel Book Club * Tips and Tricks * Transportation * Under the Hoodie * UNITED * User Behavior Analytics * User Experience * Velociraptor * Verizon DBIR * Virtual Infrastructure * Virtual Vegas * Vulnerability Assessments * Vulnerability Disclosure * Vulnerability Management * Vulnerability Risk Management * WannaCry * Whiteboard Wednesday * Windows * Worms * XDR * XSS * Zero-day RELATED POSTS Automating the Cloud: AWS Security Done Efficiently Read More Azure Security Center and Active Directory Now Integrate with the Rapid7 Platform Read More Phishing Attacks Duping Your Users? Here’s a Better Anti-Phishing Strategy. Read More Automate to Accelerate: Introducing Security Orchestration and Automation on the Rapid7 Insight Platform Read More RELATED POSTS AWS Automating the Cloud: AWS Security Done Efficiently Read Full Post Azure Azure Security Center and Active Directory Now Integrate with the Rapid7 Platform Read Full Post Breach Preparedness Phishing Attacks Duping Your Users? Here’s a Better Anti-Phishing Strategy. Read Full Post InsightVM Automate to Accelerate: Introducing Security Orchestration and Automation on the Rapid7 Insight Platform Read Full Post View All Posts BACK TO TOP CUSTOMER SUPPORT +1-866-390-8113 (Toll Free) SALES SUPPORT +1-866-772-7437 (Toll Free) Need immediate help with a breach? CLICK HERE SOLUTIONS All Solutions Industry Solutions Compliance Solutions SUPPORT & RESOURCES Product Support Resource Library Customer Stories Events & Webcasts Training & Certification IT & Security Fundamentals Vulnerability & Exploit Database ABOUT US Company Diversity, Equity, and Inclusion Leadership News & Press Releases Public Policy Open Source Investors CONNECT WITH US Contact Blog Support Login Careers © Rapid7 Legal Terms | Privacy Policy | Export Notice | Trust Chat Contact Us SUCCESS! THANK YOU FOR SUBMISSION. WE WILL BE IN TOUCH SHORTLY. OOPS! THERE WAS A PROBLEM IN SUBMISSION. PLEASE TRY AGAIN. CONTACT US All fields are mandatory First Name Last Name Job Title Job Level Job Level Analyst System/Security Admin Manager Director VP CxO Student Other Company Email Phone Country State Reason for Contact - Select - I'd like to learn more about vulnerability management I'd like to learn more about application security I'd like to learn more about incident detection and response I'd like to learn more about cloud security I'd like to learn more about Rapid7 professional or managed services I'd like to learn more about visibility, analytics, and automation I'd like to learn more about building a comprehensive security program I'd like to learn more about threat intelligence. Reason for Contact - Select - I am a consultant, partner, or reseller. I do not want to receive emails regarding Rapid7's products and services. Issues with this page? Please email info@rapid7.com. Please see updated Privacy Policy Submit CUSTOMER SUPPORT +1-866-390-8113 (Toll Free) SALES SUPPORT +1-866-772-7437 (Toll Free) NEED IMMEDIATE HELP WITH A BREACH? +1-844-727-4347 CUSTOMER SUPPORT +1-866-390-8113 (Toll Free) SALES SUPPORT +1-866-772-7437 (Toll Free) NEED IMMEDIATE HELP WITH A BREACH? +1-844-727-4347 WANT TO KEEP UP TO DATE ON NETWORK AND CLOUD SECURITY? Get the latest on emerging threats, vulnerabilities, and patches. Your Email Subscribe You’re almost done! Check your email to confirm your subscription. Diese Seite ist leider nur auf English verfügbar. Möchten Sie trotzdem fortfahren? Weiter zur deutschen Seite Auf der English Seite bleiben