Posts by Christian Kirsch

Detection and Response
IDC: 70% of Successful Breaches Originate on the Endpoint
Christian Kirsch

Detection and Response
SANS Review of Rapid7 UserInsight (now InsightUBA) for User Behavior Analytics and Incident Response
Christian Kirsch

Rapid7 Blog
UserInsight Ranks Users by Risky Behavior
Christian Kirsch

Exposure Management
10 Phishing Countermeasures to Protect Your Organization
Christian Kirsch

Cloud and Devops Security
Securing the Shadow IT: How to Enable Secure Cloud Services for Your Business
Christian Kirsch

Detection and Response
Detecting Compromised Amazon Web Services (AWS) Accounts
Christian Kirsch

Detection and Response
UserInsight Integrates with LogRhythm SIEM to Accelerate Incident Detection and Response
Christian Kirsch

Detection and Response
Protect Your Service Accounts: Detecting Service Accounts Authenticating from a New Host
Christian Kirsch

Detection and Response
Get HP ArcSight Alerts on Compromised Credentials, Phishing Attacks and Suspicious Behavior
Christian Kirsch

Vulnerabilities and Exploits
UserInsight Gets the All-Clear for ShellShock and Helps Detect Attackers on Your Network
Christian Kirsch

Products and Tools
Feedback on Rapid7's Tech Preview Process and Metasploit Pro 4.10
Christian Kirsch

Products and Tools
Hunting for Credentials: How Metasploit Pro Beat Me on the Command Line
Christian Kirsch

Products and Tools
Metasploit Pro's New Credentials Features Save Us Time in Workflows
Christian Kirsch

Products and Tools
Hacker's Dome: An Online Capture-the-Flag (CTF) Competition on May 17
Christian Kirsch

Products and Tools
Security Advisory: OpenSSL Heartbleed Vulnerability (CVE-2014-0160) in Metasploit (Updated 4/11/14 2:20pm EDT)
Christian Kirsch

Rapid7 Blog
Like msfvenom? Here's A Faster Way to Generate Stand-alone Metasploit Payloads
Christian Kirsch

Products and Tools
Free Webcast: From Framework to Pro - Using Metasploit Pro in Penetration Tests
Christian Kirsch

Products and Tools
Make Your Voice Heard & Make Metasploit More Awesome
Christian Kirsch

Detection and Response
Don't Get Blindsided: Better Visibility Into User and Asset Risks with Metasploit 4.8
Christian Kirsch

Threat Research
Learn to Pentest SAP with Metasploit As ERP Attacks Go Mainstream
Christian Kirsch

Products and Tools
Staying Stealthy: Passive Network Discovery with Metasploit
Christian Kirsch