3 min
Automation and Orchestration
Understanding Access Control Lists
Synopsis
When it comes to the security regarding routers, switches or on the basic ISP
layers, we talk about ACLs. They are generally used to control/manage the
inbound and outbound traffic. In this blog, we will be looking into basic
configuration of standard IP ACLs also known as Access Lists or in some cases
filters.
Understanding ACL
Access Control
List
as the name suggests is a list that grants or denies permission
7 min
Komand
10 Ways to Make Your Security Posture More Proactive
In a perfect world, security teams have everything they need to defend against
the complex cybersecurity threat landscape: an enviable team of security pros,
sophisticated detection and prevention processes, and intelligent alerting and
reporting tools.
But in reality, most teams and security operations centers find themselves
struggling to keep pace. And whether it’s from an imbalance in people, process,
and technology, or a data utilization problem, security teams end up in a
reactive state:
2 min
Metasploit
Metasploitable3 CTF Results and Wrap-Up
The Metasploitable3 CTF competition
has wrapped up and we have our winners! We had almost 300 flag submissions from
more than 50 fine folks. There were some really great right-ups submitted with
great details on how flags were found. Thanks to everyone who took time to
submit a finding! ON TO THE RESULTS!
When we announced the competition, we didn't specify if team submissions were
allowed or not.
4 min
Haxmas
12 Days of HaXmas: Year-End Policy Comment Roundup
Merry HaXmas to you! Each year we mark the 12 Days of HaXmas
with 12 blog posts on hacking-related
topics and roundups from the year. This year, we're highlighting some of the
“gifts” we want to give back to the community. And while these gifts may not
come wrapped with a bow, we hope you enjoy them.
On the seventh day of Haxmas, the Cyber gave to me: a list of seven Rapid7
comments to government policy proposals! Oh, tis a magical season.
It was an ac
8 min
Haxmas
12 Days of HaXmas: A HaxMas Carol
(A Story by Rapid7 Labs)
Merry HaXmas to you! Each year we mark the 12 Days of HaXmas
with 12 blog posts on hacking-related
topics and roundups from the year. This year, we're highlighting some of the
“gifts” we want to give back to the community. And while these gifts may not
come wrapped with a bow, we hope you enjoy them.
Happy Holi-data from Rapid7 Labs!
It's been a big year for the Rapid7 elves Labs team. Our nigh 200-node strong
Heisenberg Cloud
3 min
Nexpose
macOS Agent in Nexpose Now
As we look back on a super 2016, it would be easy to rest on one's laurels and
wax poetic on the halcyon days of the past year. But at Rapid7 the winter
holidays are no excuse for slowing down: The macOS Rapid7 Insight Agent is now
available within Nexpose Now.
Live Monitoring for macOS
Earlier this year, we introduced Live Monitoring for Endpoints with the release
of a Windows agent for use with Nexpose Now. The feedback from the Community has
been great (and lively!) and now we're back with a
4 min
IT Ops
Logs To Understand User Activity and Behavior
Logging user activity is a great way to understand what users are doing, and how
they are using network and computing resources. Collecting data from the
standpoint of a user identity or login is a great way to correlate all kinds of
information, too, including client or workstation activity, network and server
access, and application usage. This provides a unique opportunity to make use of
Logentries’
4 min
InsightIDR
12 Days of HaXmas: Designing Information Security Applications Your Way
Merry HaXmas to you! Each year we mark the 12 Days of HaXmas
with 12 days of blog posts on
hacking-related topics and roundups from the year. This year, we're highlighting
some of the “gifts” we want to give back to the community. And while these gifts
may not come wrapped with a bow, we hope you enjoy them.
Are you a busy Information Security professional that prefers bloated web
applications, fancy interactions, unnecessary visuals, and overloaded scr
6 min
IoT
12 Days of HaXmas: 2016 IoT Research Recap
Merry HaXmas to you! Each year we mark the 12 Days of HaXmas
with 12 blog posts on hacking-related
topics and roundups from the year. This year, we're highlighting some of the
“gifts” we want to give back to the community. And while these gifts may not
come wrapped with a bow, we hope you enjoy them.
As we close out the end of the year, I find it important to reflect on the IoT
vulnerability research conducted during 2016 and what we learned from it. Th
5 min
Haxmas
12 Days of HaXmas: The One Present This Data Scientist Wants This Holiday Season
Merry HaXmas to you! Each year we mark the 12 Days of HaXmas
with 12 blog posts on hacking-related
topics and roundups from the year. This year, we're highlighting some of the
“gifts” we want to give back to the community. And while these gifts may not
come wrapped with a bow, we hope you enjoy them.
> “May you have all the data you need to answer your questions – and may half of
the values be corrupted!”
> - Ancient Yiddish curse
This year, Christm
7 min
Haxmas
The Twelve Pains of Infosec
One of my favorite Christmas carols is the 12 Days of Christmas
. Back in the 90's, a satire of the
song came out in the form of the 12 Pains of Christmas
, which had me rolling on the floor
in laughter, and still does. Now that I am in information security, I decided it
is time for a new satire, maybe this will start a new tradition, and so I am
presenting, the 12 Pains of Infosec.
----------------------
6 min
IT Ops
The Value of Correlation IDs
In the old days when transactional behavior happened in a single domain, in
step-by-step procedures, keeping track of request/response behavior was a simple
undertaking. However, today one request to a particular domain can involve a
myriad of subsequent asynchronous requests from the starting domain to others.
For example, you send a request to Expedia, but behind the scenes Expedia is
forwarding your request as a message to a message broker. Then that message is
consumed by a hotel, airline
4 min
User Behavior Analytics
SIEM Tools Aren't Dead, They're Just Shedding Some Extra Pounds
Security Information and Event Management (SIEM)
is security's Schrödinger's cat.
While half of today's organizations have purchased SIEM tools, it's unknown if
the tech is useful to the security team… or if its heart is even beating or
deployed. In response to this pain, people, mostly marketers, love to shout that
SIEM is dead, and analysts are proposing new frameworks with SIEM 2.0/3.0,
Security Analytics, User & Entity Behavior Analytics
6 min
Automation and Orchestration
Cybersecurity careers and the certifications needed
Synopsis
Cybersecurity has become one of the top sought after careers in the Information
Technology field. Careers ranging from an ethical hacker to a security auditor.
With so many options to choose from, where do you start to pursue such a
purposeful and exciting future? I will explain some of the top certifications
that are offered and what fields they are associated with.
Institutes and their certifications
International Information Systems Security Certification Consortium, Inc. (ISC)2
7 min
Rapid7 Perspective
2017 Cybersecurity Horoscopes
What does 2017 hold for cybersecurity? Our mystics have drawn cards, checked
crystal balls, and cast runes to peer into the future. See what the signs have
in store for you in the new year.
Sage Corey Thomas, Rapid7
Gazing into the future of 2017, I believe we will continue to see market
consolidation of security vendors. With a focus on increasing productivity,
organizations will move further from disparate, point-solutions that solve just
one problem to solutions that can be leveraged through