3 min
InsightVM
What’s New in InsightVM: H1 2020 in Review
Throughout the first half of the year, we released updates and features to help security teams work more effectively and efficiently in InsightVM.
Read Full Post
2 min
InsightVM
Reduce Risk with CyberArk and Rapid7 Integrations
There are a number of out-of-the-box integrations between CyberArk and Rapid7 that can help organizations both reduce risk and ease the burden on operations teams.
Read Full Post
5 min
Vulnerability Management
Redefining How to Measure the Success of Your Vulnerability Management Program
In this post, we’ll discuss which vulnerability risk management metrics matter and which ones don’t, and how to communicate them effectively.
Read Full Post
4 min
InsightVM
The Anatomy of RDP Exploits: Lessons Learned from BlueKeep and DejaBlue
In this blog, we discuss lessons learned from RDP exploits such as BlueKeep and DejaBlue, and how organizations can be protected form future vulnerabilities.
Read Full Post
3 min
InsightVM
Do You Have Containers in Your Environment? Using Container Discovery to Be Sure
In this post, we'll show you how you can use the container security features in InsightVM to find out whether you have containers you didn't know about.
Read Full Post
1 min
Metasploit
End of Sale Announced for Metasploit Community
Today we are announcing end of sale for Metasploit Community Edition, effective immediately.
Read Full Post
3 min
InsightVM
Rapid7 Releases Cloud Configuration Assessment Capabilities in InsightVM
Rapid7 is pleased to announce that we have released new Cloud Configuration Assessment capabilities in our InsightVM vulnerability management solution.
Read Full Post
3 min
Vulnerability Management
Why Patch Management Is Crucial for Securing Your Organization
With the deluge of assets flooding corporate networks, organizations need to have a solid patch management strategy in place.
Read Full Post
3 min
Vulnerability Management
How SOAR Is Disrupting Traditional Vulnerability Management
In a recent episode of Whiteboard Wednesday, we dive into how security orchestration, automation, and response (SOAR) is changing traditional vulnerability management.
Read Full Post
3 min
Whiteboard Wednesday
How to Gain Security Visibility into a Modern Environment
In our latest installment of Whiteboard Wednesday, we break down the step-by-step approach you can take to gain visibility across a modern environment and the main areas you should focus on.
Read Full Post
1 min
InsightVM
Rapid7 Named a March 2019 Gartner Peer Insights Customers’ Choice for Vulnerability Assessment
The Rapid7 team is excited to announce that we have been recognized as a March 2019 Gartner Peer Insights Customers’ Choice for Vulnerability Assessment.
Read Full Post
3 min
InsightVM
Implementing Credential Hygiene with CyberArk and InsightVM
Effectively assess your assets with a scan engine while keeping your credentials safe with the integration between CyberArk and InsightVM and Nexpose.
Read Full Post
3 min
Vulnerability Management
Rapid7 Industry Cyber-Exposure Report Highlights the Need for Vulnerability Management
In our recently released Industry Cyber-Exposure Report: Fortune 500, we uncovered that companies across all industries in the U.S. Fortune 500 are showing signs of recurring compromise.
Read Full Post
2 min
InsightVM
Did You Remediate That? Take Control of Risk by Knowing Your Top 25 Vulnerabilities
InsightVM's Top 25 report is a great place to start when you want to take control of your overall vulnerability management program.
Read Full Post
2 min
Awards
Rapid7 Wins Frost & Sullivan 2018 Global Vulnerability Management Market Leadership Award
We’re thrilled to announce that Rapid7 InsightVM was selected as the market leader in vulnerability management by Frost & Sullivan.
Read Full Post
3 min
Vulnerability Management
Take a Bite out of the Vulnerability Remediation Backlog with InsightVM
Security teams dealing with expanding networks and increasingly sophisticated attacks can use InsightVM to help stay on top of their vulnerability backlog.
Read Full Post
5 min
InsightVM
Under the Hoodie: Which Vulns Are Being Exploited by Attackers (and Our Pen Testers) in 2018?
Software vulnerabilities are at the core of pen testing—and our "Under the Hoodie" report provides insights and advice one can only get in the trenches.
Read Full Post
4 min
InsightVM
Assess Containers During Software Builds with InsightVM
We recently released the InsightVM Container Assessment CI/CD Plugin. Built to work with Continuous Integration/Continuous Deployment (CI/CD) tools such as Jenkins, this plugin leverages InsightVM to assess containers during a software build.
Read Full Post
4 min
Vulnerability Management
3 Steps to Clear the Fog: Improving Vulnerability Remediation Visibility with InsightVM
The moment you send a vulnerability report to your IT team, you want assurance
that it’s being worked on—especially if there are critical vulnerabilities. You
also want to be sure issues are prioritized in the right way so that deadlines
are met. Often, however, this is not the reality. With different processes and
tools in place, it’s difficult to align security and IT teams for effective
vulnerability remediation
[https://www.rapid7.com/products/insightvm/use-cases/work-better-with-it-and-devo
Read Full Post
2 min
InsightVM
Rapid7 InsightVM Named Best Vulnerability Management Solution by SC Magazine
SC Media has announced the 2018 SC Awards and (drumroll, please…)
InsightVM [https://www.rapid7.com/products/insightvm/] is proud to take top
honors as Best Vulnerability Management Solution in the Trust Awards category.
Our team works tirelessly day in and day out to bring SecOps best practices
[https://www.rapid7.com/solutions/secops/] to our customers, help our customers
secure their modern networks, and work across teams to solve their trickiest
problems. It means the world to us when th
Read Full Post
2 min
Events
Hack with Metasploit: Announcing the UNITED 2017 CTF
Got mad skillz? Want mad skillz? This year at Rapid7's annual UNITED Summit
[https://unitedsummit.org/index.php], we're hosting a first-of-its-kind Capture
the Flag (CTF) competition. Whether you're a noob to hacking or a grizzled pro,
you'll emerge from our 25-hour CTF with more knowledge and serious bragging
rights. Show off your 1337 abilities by competing for top prizes, or learn how
to capture your first ever flag. Read on for details, and if you haven't already
done so, register for UNITED
Read Full Post
3 min
Metasploit
Securing Your Metasploit Logs
Metasploit, backed by a community of 200,000 users and contributors is the most
impactful penetration testing solution on the planet. With it, uncover
weaknesses in your defenses, focus on the highest risks, and improve your
security outcomes. Your Metasploit Pro console produces a lot of important logs.
It is essential to be able to review these logs, alert on them, and keep them
secure.
Why should I monitor these logs?
The logs produced by your Metasploit Pro console are helpful when
troubl
Read Full Post