Business
WordPress is a favorite blogging tool of mine and I share tips and tricks for using WordPress here.
Best practice guide: Create an AI governance programme from scratch
Best practice guide: Create an AI governance programme from scratch
The rise of artificial intelligence has transformed industries, offering cutting-edge solutions to complex challenges. However, along with innovation come critical…
AI in the modern enterprise: A GRC leader’s guide to trust, control, and strategic advantage
AI in the modern enterprise: A GRC leader’s guide to trust, control, and strategic advantage
Whether you agree that the rise of AI constitutes another industrial revolution or you think such views are overhyped, there’s…
7 tips to build a strong foundation for continuous control testing
7 tips to build a strong foundation for continuous control testing
In a fast-evolving risk and regulatory landscape, compliance programmes must be able to respond to new requirements with agility. Yet,…
Navigating the triple threat of a volatile regulatory landscape
Navigating the triple threat of a volatile regulatory landscape
At first glance, companies seem to have regulatory compliance under control. Few notice any obvious gaps. But beneath this superficial…
AI in Action: How Rapid7 is Redefining Security Operations
AI in Action: How Rapid7 is Redefining Security Operations
AI is transforming cybersecurity, and Rapid7 is at the forefront of integrating AI across our platform. In this session, we’ll…
Anatomy of an Attack Infographic
Anatomy of an Attack Infographic
Walk through the anatomy of a real-world cyberattack with Rapid7 experts. In this infographic, learn how attackers think, move, and…
The End of Legacy SIEM and the Rise of Incident Command
The End of Legacy SIEM and the Rise of Incident Command
The SIEM of 20 years ago is being outpaced by modern attackers. In this paper, Rapid7 shares the way legacy…
First 24 Hours of a Cyberattack eBook
First 24 Hours of a Cyberattack eBook
What really happens in the first 24 hours of a cyberattack? In this eBook, we walk through a real-world zero-day…
SANS 2025 Detection and Response Survey: Unseen Threats Have Security Teams Rethinking Detection
SANS 2025 Detection and Response Survey: Unseen Threats Have Security Teams Rethinking Detection
The survey shows how organizations are still facing skill shortages, alert fatigue, and expanding attack surfaces. The findings reflect a…
The Next-Gen SIEM Buyer’s Guide
The Next-Gen SIEM Buyer’s Guide
As security teams face a rapidly changing threat landscape, Security Information and Event Management (SIEM) remains the backbone of modern…