logo

Last Update

This profile was last updated on 6/6/2017 and contains contributions from the  Zoominfo Community.

is this you? Claim your profile.

Wrong Ross Barrett?

Ross C. Barrett

Director of Engineering, Portfolio Data Collection and Assessment

Rapid7 LLC

HQ Phone:  (617) 247-1717

Direct Phone: (647) ***-****direct phone

Email: r***@***.com

GET ZOOMINFO GROW

+ Get 10 Free Contacts a Month

Please agree to the terms and conditions.

I agree to the  Terms of Service and  Privacy Policy. I understand that I will receive a subscription to ZoomInfo Grow at no charge in exchange for downloading and installing the ZoomInfo Contact Contributor utility which, among other features, involves sharing my business contacts as well as headers and signature blocks from emails that I receive.

THANK YOU FOR DOWNLOADING!

computers
  • 1.Download
    ZoomInfo Grow
    v sign
  • 2.Run Installation
    Wizard
  • 3.Check your inbox to
    Sign in to ZoomInfo Grow

I agree to the Terms of Service and Privacy Policy. I understand that I will receive a subscription to ZoomInfo Community Edition at no charge in exchange for downloading and installing the ZoomInfo Contact Contributor utility which, among other features, involves sharing my business contacts as well as headers and signature blocks from emails that I receive.

Rapid7 LLC

100 Summer Street 13Th Floor

Boston, Massachusetts, 02110

United States

Company Description

Rapid7 is a leading provider of security data and analytics solutions that enable organizations to implement an active, analytics-driven approach to cyber security. We combine our extensive experience in security data and analytics and deep insight into attack...more

Find other employees at this company (1,318)

Web References(130 Total References)


Microsoft unexpectedly drops Public Patch Tuesday Alerts - Hyphenet

Also Ross Barrett, senior manager of security engineering, at Rapid7, "This is an assault on IT and IT security teams everywhere," Barrett wrote in an email reply to questions.
"Microsoft is basically going back to a message of 'just blindly trust' that we will patch everything for you," said Barrett of Rapid 7.


May 2014 - Malta ICT

"This is the first advisory that clearly would have applied to Windows XP," said Ross Barrett, senior manager of security engineering at Rapid7, in an email yesterday.
"IE6, IE7 and IE8 are vulnerable on Windows [Server] 2003; this would historically have mapped to the same scope of XP patches, but not this time." As Barrett noted, Microsoft's security bulletin listed Windows Server 2003 as affected by the vulnerability. The server software was patched Tuesday because its support lifespan runs until July 14, 2015.


Microsoft and Adobe Both Release Critical Updates | Tech Speak Canada

Ross Barrett, Senior Manager of Security Engineering at Rapid7 said that this is the first time Microsoft has addressed a single TrueType vulnerability in three separate advisories (MS13-052, MS13-053, and MS13-054).
"By splitting this out, Microsoft is directly addressing a complaint about previous 'rolled up' advisories where it was difficult to properly prioritize the multiple patches required to remediate the problem, and component patches were frequently missed," Barrett explained.


Page 2 | Intrinsic Communications Connect | Keeping you up to date on the world of IT Communications

Ross Barrett, senior manager of security engineering at Rapid7, agrees.
"If this is truly a remotely exploitable issue that does not require user interaction, then it's a potentially wormable issue and definitely should be put at the top of the patching priority list," Barrett says. Another critical alert, Bulletin 1, affects current versions of operating systems Windows 8 (and Windows RT) and Windows Server 2012, as well as earlier versions back through Windows XP and Windows Server 2003.


Big Round of Patches This Month... | Saint Cloud Computers

Indeed, according to Ross Barrett, manager of security engineering at Rapid7, the IE patch addresses a vulnerability first demonstrated at thePwn2Own contest at the CanSecWest conference in March of this year.
"Microsoft has described this as extremely difficult to exploit, which I can only assume is a challenge to exploit writers everywhere to prove them wrong," Barrett quipped.


Similar Profiles

city

Browse ZoomInfo's Business
Contact Directory by City

city

Browse ZoomInfo's
Business People Directory

city

Browse ZoomInfo's
Advanced Company Directory