Latest from Recorded Future

The Proactive CISO’s Playbook: How to close the Exposure Gap and Manage Cyber Risk with Confidence

Trend Micro’s “The Proactive CISO’s Playbook” guides CISOs in shifting from reactive security to strategic leadership. It emphasizes incident readiness, cross-functional collaboration, and continuous improvement. By adopting a proactive, assume-breach mindset, CISOs can build resilient organizations, foster transparency, and drive board-level engagement in cybersecurity.

Read →

The 2024 Attack Intelligence Report

This report presents data and insights that security practitioners can use to better understand and guard against some of the most significant attacks and TTPs occurring in today’s cyber threat landscape. By examining recent notable vulnerabilities and high-impact attacks, the experts of Rapid7 Labs identify trends and add valuable context so you can command your […]

Read →

Ransomware: Understand. Prevent. Recover.

Ransomware. The very name strikes fear in the heart of organizations. This type of malware attack isn’t new, but it’s more popular than ever before. The scourge of ransomware is now in the news on a weekly basis, as companies all over the world — big and small, public and private — wonder if it […]

Read →

Executive Brief: Inside the Dark Web

Only 42% of companies are actively monitoring the dark web for threats. That is a surprisingly low number when so many threat actors are planning their next attack on the dark web. If your organization isn’t monitoring the dark web, you could be missing out on important information regarding your security. However, monitoring the dark […]

Read →

The Security Intelligence Handbook, Third Edition

The latest edition of our popular book paints a clear picture of security intelligence, as well as actionable guidance for disrupting the threat actors targeting your organization right now — and in the future. “The Security Intelligence Handbook” is your definitive guide for proactive risk reduction. This edition has been updated to include a new […]

Read →

Patch What Matters with Risk-Based Vulnerability Management

Patching vulnerabilities is critical for protecting an organization’s data and assets. 60% of breaches have been linked to a vulnerability where a patch was available but not applied. However, identifying which vulnerabilities are a priority is difficult, and relying on CVSS scores alone won’t do the job. Of the 18,000 vulnerabilities identified in 2020, nearly […]

Read →

Digital (IT) Governance Is Broken: 9 Ways Enterprises Mismanage Their Cyber Risk

In this paper, security and risk experts Levi Gundert and Courtenay Brammar draw from consulting experience, candid conversations with security leaders, and empirical research to tackle this major issue facing enterprise organizations. Download this white paper to learn more about the issues currently plaguing enterprise cyber governance and the specific remedies for organizational leaders striving […]

Read →

Forrester Now Tech: External Threat Intelligence Services, Q4 2020

Many organizations are expanding traditional threat intelligence programs to include vulnerability management, brand protection, and other critical security functions. With a “big picture view” of risk, they’re empowered with the advanced warning and actionable facts needed to protect themselves. Download the new Forrester Now Tech: External Threat Intelligence Services, Q4 2020 report to explore the […]

Read →

4 Ways to Supercharge your Security With Intelligence

Having access to lots of security data — alerts, vulnerability scan data, suspicious files — is great. The hard part is knowing where to take action first. Security intelligence empowers you to prioritize what matters — no matter what security role you play within your organization. Recorded Future Express is our free browser extension that […]

Read →
25,000+
Articles
500K+
Monthly Readers
300+
Sponsors
15+
Years of Insights