Rapid7 Whitepapers


Sort by: Date | Company | Title


2017 Vulnerability Management Survey Infographic
By Rapid7 | 2/6/2017

Cloud Security and Staff Security Training are the 2 biggest challenges facing Australian organisations in 2017, according to the CSO and Rapid 7 Vulnerability Management Survey.

Download this now


2017 Vulnerability Management Survey Report
By Rapid7 | 2/6/2017

Vulnerability management still wanting as Australian businesses struggle to stay ahead of security risks. Australian businesses are still suffering from deficient vulnerability scanning practices, according to new survey data suggesting the industry is shifting away from implementing specific technologies and towards broader capabilities including cloud security and incident detection and response.

Download this now


PCI DSS v3.0 - Compliance Guide
By Rapid7 | 31/3/2014

Due to a lack of consumer confidence and a subsequent drop in sales, all entities that handle credit cardholder information are being challenged to adopt more effective data protection measures. This paper provides information on available tools to help validate compliance with the latest version of the Payment Card Industry Data Security Standard (PCI DSS).

Download this now


Using an Expert System for Deeper Vulnerability Scanning
By Rapid7 | 31/3/2014

This paper serves security professionals interested in better techniques for finding vulnerabilities, who have a solid understanding of networking principles and familiarity with the concepts related to hacking, vulnerabilities, and exploits. Read on for an in-depth view of the use of expert systems to achieve accurate and detailed vulnerability results.

Download this now


Top 20 Critical Security Controls - Compliance Guide
By Rapid7 | 31/3/2014

Simply being compliant is not enough to mitigate attacks and protect critical information. Organizations can reduce chances of compromise by shifting away from a compliance-driven approach. This guide provides the Top 20 Critical Security Controls (CSCs) developed by the SANS Institute to address the need for a risk-based approach to security.

Download this now