Norwich U Pares Down Network Vulnerabilities

Norwich University has gone public with its deployment of Rapid7's NeXpose to expand network visibility. In the process, the private military college said in a statement, it eliminated 1,500 vulnerabilities in its IT infrastructure. The school uses the software to scan for and prioritize network threats, validate policy levels, and discover software vulnerabilities on its servers and operating systems.

The university's computer infrastructure includes dorm rooms outfitted with wired and wireless connections and a recently overhauled campus-wide wireless network. Within the first day of deployment, IT administrators did a scan of the entire network, which runs both Windows and Linux, and identified some 3,000 network vulnerabilities, each ranked by threat level and impact. Starting with the most critical issues, the IT staff was able to eliminate more than 1,000 of the vulnerabilities within the first month, eradicating another 500 by the close of the second.

"Our infrastructure is complex and continuing to grow," said Jeremy Wood, information security analyst. "Because of its size, we did not have complete visibility into our environment, and it was also difficult to complete manual audits of our infrastructure for the in-depth analysis we needed to manage our risk. Rapid7 provides a complete risk profile for our entire environment and then prioritizes which vulnerabilities need to be addressed immediately. We've significantly reduced our number of vulnerabilities and increased our efficiency."

The university is also using NeXpose to test its security policies and identify violations, such as guessable passwords and file permissions and to audit which accounts are available on each system.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • open laptop in a college classroom with holographic AI icons like a brain and data charts rising from the screen

    4 Ways Universities Are Using Google AI Tools for Learning and Administration

    In a recent blog post, Google shared an array of education customer stories, showcasing ways institutions are using AI tools like Gemini and NotebookLM to transform both learning and administrative tasks.

  • illustration of a human head with a glowing neural network in the brain, connected to tech icons on a cool blue-gray background

    Meta Launches Stand-Alone AI App

    Meta Platforms has introduced a stand-alone artificial intelligence app built on its proprietary Llama 4 model, intensifying the competitive race in generative AI alongside OpenAI, Google, Anthropic, and xAI.

  • three main icons—a cloud, a user profile, and a padlock—connected by circuit lines on a blue abstract background

    Report: Identity Has Become a Critical Security Perimeter for Cloud Services

    A new threat landscape report points to new cloud vulnerabilities. According to the 2025 Global Threat Landscape Report from Fortinet, while misconfigured cloud storage buckets were once a prime vector for cybersecurity exploits, other cloud missteps are gaining focus.

  • Stylized illustration showing cybersecurity elements like shields, padlocks, and secure cloud icons on a neutral, minimalist digital background

    Microsoft Announces Security Advancements

    Microsoft has announced major security advancements across its product portfolio and practices. The work is part of its Secure Future Initiative (SFI), a multiyear cybersecurity transformation the company calls the largest engineering project in company history.