Christian Kirsch's picture

Posts by Christian Kirsch

IDC: 70% of Successful Breaches Originate on the Endpoint

Detection and Response

IDC: 70% of Successful Breaches Originate on the Endpoint

Christian Kirsch's avatar

Christian Kirsch

SANS Review of Rapid7 UserInsight (now InsightUBA) for User Behavior Analytics and Incident Response

Detection and Response

SANS Review of Rapid7 UserInsight (now InsightUBA) for User Behavior Analytics and Incident Response

Christian Kirsch's avatar

Christian Kirsch

UserInsight Ranks Users by Risky Behavior

Rapid7 Blog

UserInsight Ranks Users by Risky Behavior

Christian Kirsch's avatar

Christian Kirsch

10 Phishing Countermeasures to Protect Your Organization

Exposure Management

10 Phishing Countermeasures to Protect Your Organization

Christian Kirsch's avatar

Christian Kirsch

Securing the Shadow IT: How to Enable Secure Cloud Services for Your Business

Cloud and Devops Security

Securing the Shadow IT: How to Enable Secure Cloud Services for Your Business

Christian Kirsch's avatar

Christian Kirsch

Detecting Compromised Amazon Web Services (AWS) Accounts

Detection and Response

Detecting Compromised Amazon Web Services (AWS) Accounts

Christian Kirsch's avatar

Christian Kirsch

UserInsight Integrates with LogRhythm SIEM to Accelerate Incident Detection and Response

Detection and Response

UserInsight Integrates with LogRhythm SIEM to Accelerate Incident Detection and Response

Christian Kirsch's avatar

Christian Kirsch

Protect Your Service Accounts: Detecting Service Accounts Authenticating from a New Host

Detection and Response

Protect Your Service Accounts: Detecting Service Accounts Authenticating from a New Host

Christian Kirsch's avatar

Christian Kirsch

Get HP ArcSight Alerts on Compromised Credentials, Phishing Attacks and Suspicious Behavior

Detection and Response

Get HP ArcSight Alerts on Compromised Credentials, Phishing Attacks and Suspicious Behavior

Christian Kirsch's avatar

Christian Kirsch

UserInsight Gets the All-Clear for ShellShock and Helps Detect Attackers on Your Network

Vulnerabilities and Exploits

UserInsight Gets the All-Clear for ShellShock and Helps Detect Attackers on Your Network

Christian Kirsch's avatar

Christian Kirsch

Feedback on Rapid7's Tech Preview Process and Metasploit Pro 4.10

Products and Tools

Feedback on Rapid7's Tech Preview Process and Metasploit Pro 4.10

Christian Kirsch's avatar

Christian Kirsch

Hunting for Credentials: How Metasploit Pro Beat Me on the Command Line

Products and Tools

Hunting for Credentials: How Metasploit Pro Beat Me on the Command Line

Christian Kirsch's avatar

Christian Kirsch

Metasploit Pro's New Credentials Features Save Us Time in Workflows

Products and Tools

Metasploit Pro's New Credentials Features Save Us Time in Workflows

Christian Kirsch's avatar

Christian Kirsch

Hacker's Dome: An Online Capture-the-Flag (CTF) Competition on May 17

Products and Tools

Hacker's Dome: An Online Capture-the-Flag (CTF) Competition on May 17

Christian Kirsch's avatar

Christian Kirsch

Security Advisory: OpenSSL Heartbleed Vulnerability (CVE-2014-0160) in Metasploit (Updated 4/11/14 2:20pm EDT)

Products and Tools

Security Advisory: OpenSSL Heartbleed Vulnerability (CVE-2014-0160) in Metasploit (Updated 4/11/14 2:20pm EDT)

Christian Kirsch's avatar

Christian Kirsch

Like msfvenom? Here's A Faster Way to Generate Stand-alone Metasploit Payloads

Rapid7 Blog

Like msfvenom? Here's A Faster Way to Generate Stand-alone Metasploit Payloads

Christian Kirsch's avatar

Christian Kirsch

Free Webcast: From Framework to Pro - Using Metasploit Pro in Penetration Tests

Products and Tools

Free Webcast: From Framework to Pro - Using Metasploit Pro in Penetration Tests

Christian Kirsch's avatar

Christian Kirsch

Make Your Voice Heard & Make Metasploit More Awesome

Products and Tools

Make Your Voice Heard & Make Metasploit More Awesome

Christian Kirsch's avatar

Christian Kirsch

Don't Get Blindsided: Better Visibility Into User and Asset Risks with Metasploit 4.8

Detection and Response

Don't Get Blindsided: Better Visibility Into User and Asset Risks with Metasploit 4.8

Christian Kirsch's avatar

Christian Kirsch

Learn to Pentest SAP with Metasploit As ERP Attacks Go Mainstream

Threat Research

Learn to Pentest SAP with Metasploit As ERP Attacks Go Mainstream

Christian Kirsch's avatar

Christian Kirsch

Staying Stealthy: Passive Network Discovery with Metasploit

Products and Tools

Staying Stealthy: Passive Network Discovery with Metasploit

Christian Kirsch's avatar

Christian Kirsch