Rapid7

Displaying 1-10 of 10 results

  • White Papers // Nov 2009

    Protecting Patient Health Information in the HITECH Era: Security Challenges for Adopting Health Information Technology to Comply With HIPAA and the HITECH Act

    The American Healthcare system is getting a complete facelift thanks to incentives to adopt Health Information Technology introduced by the Health Information Technology for Economic and Clinical Health (HITECH) Act. Signed into law by President Barack Obama in February 2009, the HITECH Act is part of the American Recovery and...

    Provided By Rapid7

  • White Papers // Apr 2009

    Proactive Vulnerability Management Using Rapid7 NexPose

    The volatile network environment of most organizations requires organizations to proactively identify and remediate network vulnerabilities regularly to prevent hackers or disgruntled insiders from exploiting these network weaknesses. The process of identifying vulnerabilities, evaluating the risk, remediation and reporting is called vulnerability management. By using a formal vulnerability management process,...

    Provided By Rapid7

  • White Papers // Mar 2009

    IT Security in Higher Education

    The technology environment in higher education is complicated by many factors. First, there are often ambiguous campus perimeters. Many schools have a transient student population, and, even when this is not the case, computer equipment is often moved during the school year between campus and home. This situation is further...

    Provided By Rapid7

  • White Papers // Mar 2009

    Web Application Scanning: Securing Your Web Site From Malicious Intruders

    IT security and network administrators are responsible for protecting their networks and everything that runs on them, including Web applications. When there is a breach or an exploit, the responsible security team (or person) becomes the center of attention. This "Attention" comes with a high price tag; in 2007 alone,...

    Provided By Rapid7

  • White Papers // Mar 2009

    Securing Web 2.0 Applications: Closing the Door to Dangerous Visitors

    It wasn't long ago that many doubted the heavy use of JavaScript in corporate applications. Real enterprise applications were built using programming languages and client/server configurations. Web technologies have enabled the Internet to develop into an application platform, becoming the platform of choice for both internal and external corporate applications....

    Provided By Rapid7

  • White Papers // Mar 2009

    Using an Expert System for Deeper Vulnerability Scanning

    The objective of NeXpose is to provide a maximally invasive penetration of a set of computer systems using known and unknown vulnerabilities to access data and demonstrate how control of the system can be achieved. It is up to the user whether to choose the most invasive methods, or choose...

    Provided By Rapid7

  • White Papers // Feb 2009

    Understanding & Deploying the PCI Data Security Standard

    The Payment Card Industry Data Security Standard (PCI DSS) is a worldwide standard designed to help organizations secure cardholder processing environments. Formed in 2004 by Visa, MasterCard, American Express, Discover, and JCB, in response to the emerging threat to cardholder information, the PCI Standard Security Council (PCI SSC) provides 12...

    Provided By Rapid7

  • White Papers // Feb 2009

    Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance

    Cyber-attacks designed for financial gain are on the rise, targeting proprietary information including customer and financial information. With over 127 million records exposed in 20071 in the US alone, attacks have become more sophisticated, involving not only attacks at both the network layer and the application layer but also other...

    Provided By Rapid7

  • White Papers // Jan 2009

    Web Application Security: Managing Cross-Site Scripting, the Number One Item on OWASP's Top Ten List

    The Open Web Application Security Project (OWASP) is, by its own definition, "a worldwide free and open community focused on improving the security of application software. Its mission is to make application security 'Visible,' so that people and organizations can make informed decisions about application security risks." The global OWASP...

    Provided By Rapid7

  • White Papers // Jan 2009

    Penetration Testing - Knowledge Is Power: Preparing Your Enterprise to Withstand Attack

    An enterprise IT environment can never be completely secure, but by taking prudent steps to minimize the vulnerabilities, one can greatly enhance the security posture. By having a confidential, independent assessment of the IT environment, one can provide a higher level of security against inevitable attacks and help prioritize the...

    Provided By Rapid7

  • White Papers // Feb 2009

    Understanding & Deploying the PCI Data Security Standard

    The Payment Card Industry Data Security Standard (PCI DSS) is a worldwide standard designed to help organizations secure cardholder processing environments. Formed in 2004 by Visa, MasterCard, American Express, Discover, and JCB, in response to the emerging threat to cardholder information, the PCI Standard Security Council (PCI SSC) provides 12...

    Provided By Rapid7

  • White Papers // Apr 2009

    Proactive Vulnerability Management Using Rapid7 NexPose

    The volatile network environment of most organizations requires organizations to proactively identify and remediate network vulnerabilities regularly to prevent hackers or disgruntled insiders from exploiting these network weaknesses. The process of identifying vulnerabilities, evaluating the risk, remediation and reporting is called vulnerability management. By using a formal vulnerability management process,...

    Provided By Rapid7

  • White Papers // Nov 2009

    Protecting Patient Health Information in the HITECH Era: Security Challenges for Adopting Health Information Technology to Comply With HIPAA and the HITECH Act

    The American Healthcare system is getting a complete facelift thanks to incentives to adopt Health Information Technology introduced by the Health Information Technology for Economic and Clinical Health (HITECH) Act. Signed into law by President Barack Obama in February 2009, the HITECH Act is part of the American Recovery and...

    Provided By Rapid7

  • White Papers // Jan 2009

    Web Application Security: Managing Cross-Site Scripting, the Number One Item on OWASP's Top Ten List

    The Open Web Application Security Project (OWASP) is, by its own definition, "a worldwide free and open community focused on improving the security of application software. Its mission is to make application security 'Visible,' so that people and organizations can make informed decisions about application security risks." The global OWASP...

    Provided By Rapid7

  • White Papers // Feb 2009

    Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance

    Cyber-attacks designed for financial gain are on the rise, targeting proprietary information including customer and financial information. With over 127 million records exposed in 20071 in the US alone, attacks have become more sophisticated, involving not only attacks at both the network layer and the application layer but also other...

    Provided By Rapid7

  • White Papers // Mar 2009

    Web Application Scanning: Securing Your Web Site From Malicious Intruders

    IT security and network administrators are responsible for protecting their networks and everything that runs on them, including Web applications. When there is a breach or an exploit, the responsible security team (or person) becomes the center of attention. This "Attention" comes with a high price tag; in 2007 alone,...

    Provided By Rapid7

  • White Papers // Jan 2009

    Penetration Testing - Knowledge Is Power: Preparing Your Enterprise to Withstand Attack

    An enterprise IT environment can never be completely secure, but by taking prudent steps to minimize the vulnerabilities, one can greatly enhance the security posture. By having a confidential, independent assessment of the IT environment, one can provide a higher level of security against inevitable attacks and help prioritize the...

    Provided By Rapid7

  • White Papers // Mar 2009

    Securing Web 2.0 Applications: Closing the Door to Dangerous Visitors

    It wasn't long ago that many doubted the heavy use of JavaScript in corporate applications. Real enterprise applications were built using programming languages and client/server configurations. Web technologies have enabled the Internet to develop into an application platform, becoming the platform of choice for both internal and external corporate applications....

    Provided By Rapid7

  • White Papers // Mar 2009

    Using an Expert System for Deeper Vulnerability Scanning

    The objective of NeXpose is to provide a maximally invasive penetration of a set of computer systems using known and unknown vulnerabilities to access data and demonstrate how control of the system can be achieved. It is up to the user whether to choose the most invasive methods, or choose...

    Provided By Rapid7

  • White Papers // Mar 2009

    IT Security in Higher Education

    The technology environment in higher education is complicated by many factors. First, there are often ambiguous campus perimeters. Many schools have a transient student population, and, even when this is not the case, computer equipment is often moved during the school year between campus and home. This situation is further...

    Provided By Rapid7