Quick Cookie Notification

This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.


View Cookie Policy for full details

Rapid7 Blog

Komand  

Accelerate Incident Response with Security Orchestration and Automation

Security orchestration and automation can be a saving grace in security for many resource-strapped or highly targeted companies.…

Building a Tech Stack to Enable Security Orchestration and Automation

In this blog post, we explore how to plan for security orchestration and automation while building out your technology stack. Learn more.…

How Security Automation Helps You Work Smarter and Improve Accuracy

Many of us, across many different industries, have to make decisions amidst a multitude of different input and alerts. Wherever possible, automating certain responsibilities can aid tremendously in reducing the manual workload, helping us cut down on human error and make better decisions. Take the…

Do You Need Coding Resources on Your Security Team?

Often when security teams think about security automation, they worry they don’t have the coding capabilities needed to create, implement, and maintain it. Pulling development resources from the IT team or engineering department can take time; backlogs are long, and revenue-generating projects tend to…

How Security Orchestration and Automation Will Unite Infosec

After working in the security industry for 15 years, one of the consistent themes I’ve observed is how teams struggle with balancing the increasing amount of work they have to do, without an increase in resources to accomplish their goals. But there’s another,…

2017 Security Careers Highlights: Roles and Responsibilities in Demand

The demand for security professionals today is higher than it’s ever been before. It’s a hot field to be in, considering how fast technology is advancing, companies are digitizing, and threats are proliferating. 2017 paved the way for massive growth in the security…

How to Securely Handle a Lost or Stolen Device: A Practical Workflow

It’s 10pm and you receive an email from a teammate that their laptop was stolen at a local networking event. You learn that not only was their computer unlocked, but they were logged into their company email and Salesforce accounts at the time the…

Security Career Paths: Common and Unique Roles

Security is one of the most in-demand roles today. According to recent numbers, the demand for security workers is expected to grow to 6 million worldwide by 2019. So how do you get into or grow your career in security? What makes security so interesting…

Why Security Teams Should Embrace (Not Fear) Automation

It’s not the coming of the apocalypse. It’s not the end of the security profession. And it’s certainly not a bad thing. We’re talking about the rise of automation. As security threats become a bigger part of the day-to-day concerns at…

Everything You Need to Know About Building a Career in Security

Are you thinking about pursuing a career in security? Or have you already started one, and you’re wondering what it will take to get to the next level? Perhaps you have been in the security field for a long time, and it’s starting…

SOC Series: How to Choose the Right Skills for Your SOC

Do you have the right mix of skills in your security operations center (SOC)? Whether your SOC is brand new or has been around for years, you need to be sure it’s built to meet the demands of today’s complex security landscape. In…

How to Password Protect Apache Directories with mod_authn_dbd and MySQL on Ubuntu Linux

Synopsis The mod_authn_dbd is an Apache module that provides the functionality for Apache to authenticate users with MySQL database. This module provides authentication front-ends such as mod_auth_digest and mod_auth_basic to authenticate users by looking up users in MySQL tables.…

How To Secure Apache with Let's Encrypt on Ubuntu Linux

Synopsis Improving your website security has generally been most complicated and expensive task for every Linux administrator. Let’s Encrypt is a free, automated, and open certificate authority that provides free X.509 certificates for Transport Layer Security encryption via an automated process. It is…

How to Secure SSH Server using Port Knocking on Ubuntu Linux

Synopsis Port Knocking is a method used to secure your port access from unauthorised users. Port Knocking works by opening ports on a firewall by generating a connection attempt on a set of prespecified closed ports. Once a correct sequence of connection attempts is received,…

How to Secure MySQL Server on Ubuntu Linux

Synopsis Now a day database server is very critical and necessary component for any applications. Databases can be found in everything from web applications, web server to smartphones and other devices. Most of software applications rely on a database to store its data. This is…