Quick Cookie Notification

This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.


View Cookie Policy for full details

Rapid7 Blog

Komand  

How to Send Bro Event Data to Komand

Our integrations team recently attended BroCon at the National Center for Supercomputing Applications in Urbana, IL. BroCon is an annual network security monitoring conference for users and developers of the Bro network security monitoring platform. They got excited about the interesting research going on, and…

How Security Teams Can Learn to Advocate for Resources

It’s no secret that security teams today are severely resource-constrained and busier than ever.  As your days get longer, the work becomes more complex, and you begin to burn out, you need to be able to advocate for more resources — whether that be for…

An Interview with Rebekah Brown, Co-Author of Intelligence-Driven Incident Response

We recently interviewed Rebekah Brown for our Defender Spotlight series on the topic of her life as a cybersecurity defender. When we spoke with her, she also talked in-depth about how threat intelligence can inform and improve the incident response lifecycle. Rebekah practices these concepts…

RSA (Rivest, Shamir and Adleman)

Synopsis Rivest, Shamir & Adleman (RSA) is the public key cryptosystem.  The phenomenon of data transmission is secured through it. The letters “RSA” are the initials of the inventor of the system. Four steps are incorporated in this algorithm: Encryption, Decryption, Key Distribution and Key…

DES (Data Encryption Standard)

Synopsis The Data which is encrypted by symmetric key method is called Data Encryption Standard (DES). It was prepared by IBM Team in 1974 and declared as national standard in 1977. Government was also using cryptography, especially in diplomatic communication and military. Without cryptography it’…

How to Use Your Threat Model as a Guidepost for Security

The threats you face are unique to your company's size, industry, customer base, and many other factors. So your approach to protecting your organization's digital data should be unique, too. In this post, we’ll cover a framework to develop an effective threat model that…

Defender Spotlight: Rebekah Brown, Threat Intelligence Lead at Rapid7

Welcome to Defender Spotlight! In this blog series, we interview cybersecurity defenders of all varieties about their experience working in security operations. Editor's Note: When we originally approached Rebekah for the Defender Spotlight series, Komand and Rapid7 had not yet discussed acquisition. Some time after…

Exploring SHA-1 (Secure Hash Algorithm)

Synopsis In computer cryptography, a popular message compress standard is utilized known as Secure Hash Algorithm (SHA). Its enhanced version is called SHA-1. It has the ability to compress a fairly lengthy message and create a short message abstract in response.  The algorithm can be…

Triple DES, 3-DES Network Encryptor

Synopsis Triple Data Encryption Algorithm (3DES) is an advancement of the popular DES standard.  3DES utilizes symmetric key block cipher. Using three unrelated 64 bit keys, 3DES was created to encrypt 64 bit blocks of data.    In DES block, each key is utilized as an…

The Future of Komand is Bright

When Komand was founded, we had a simple vision: make cybersecurity better for everyone, together as a community. It’s a grand statement, but in order to achieve big, you have to dream big. And so we dreamt big with Komand. To help security teams…

Balancing Human and Machine Input in Information Security

Humans have feared the takeover of machines since the early days of the personal computer. But if anything, machines (namely, security tools) have made us more powerful, more effective, and more connected. While they eliminate many manual, human tasks, this can actually be a good…

Knowing Dynamic Multipoint Virtual Private Network – DMVPN

Synopsis: Dynamic Multipoint Virtual Private Network (DMVPN) is a solution which enables the data to transfer from one site to another, without having the verification process of traffic. That use to be held at main VPN server of the concerned organization. This process helps the…

Information Security Risk Management Cycle - Overview

Synopsis Information security risk management is a wide topic, with many notions, processes, and technologies that are often confused with each other. In this series of articles, I explain notions and describe processes related to risk management. I also review NIST and ISO standards related…

Getting Started with Group Encrypted Transport Virtual Private Network (GETVPN)

Synopsis Group Encrypted Transport Virtual Private Network (GETVPN) solution is incorporated with innovative technologies which use to consume the power of underlying Multi Protocol Label Switching (MPLS) / Shared IP Networks. It brings the idea of trusted group to remove the integration of overlay routing and…

How to Install and Configure AIDE on Ubuntu Linux

Synopsys Aide also known as Advanced Intrusion Detection Environment is an open source host based file and directory integrity checker. It is a replacement for the well-known Tripwire integrity checker that can be used to monitor filesystem for unauthorized change. It is very usefull when…