The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

CIS Critical Security Control 15 Explained: Wireless Access Control – Are You Really Managing Your WiFi?

Security Operations

CIS Critical Security Control 15 Explained: Wireless Access Control – Are You Really Managing Your WiFi?

Bob Boyles's avatar

Bob Boyles

Metasploit Wrapup 4/27/18

Products and Tools

Metasploit Wrapup 4/27/18

Brendan Watters's avatar

Brendan Watters

Drupalgeddon Vulnerability: What is it? Are You Impacted?

Threat Research

Drupalgeddon Vulnerability: What is it? Are You Impacted?

boB Rudis's avatar

boB Rudis

Rapid7 InsightVM Named Best Vulnerability Management Solution by SC Magazine

Security Operations

Rapid7 InsightVM Named Best Vulnerability Management Solution by SC Magazine

Justin Buchanan's avatar

Justin Buchanan

How to Detect Devices on Your Network Running Telnet Services

Detection and Response

How to Detect Devices on Your Network Running Telnet Services

Rapid7's avatar

Rapid7

How to Identify Attacker Reconnaissance on Your Internal Network

Security Operations

How to Identify Attacker Reconnaissance on Your Internal Network

Christie Ott's avatar

Christie Ott

CIS Critical Control 14 Explained: Controlled Access Based on the Need to Know

Security Operations

CIS Critical Control 14 Explained: Controlled Access Based on the Need to Know

Brian Carey's avatar

Brian Carey

Metasploit Wrapup 4/20/18

Products and Tools

Metasploit Wrapup 4/20/18

Aaron Soto's avatar

Aaron Soto

Should Security Teams Use CSP Nonces to Better Comply with PCI?

Rapid7 Blog

Should Security Teams Use CSP Nonces to Better Comply with PCI?

Rapid7's avatar

Rapid7

How to Remediate Vulnerabilities Across Multiple Offices

Products and Tools

How to Remediate Vulnerabilities Across Multiple Offices

Nathan Palanov's avatar

Nathan Palanov

Attacker Behavior Analytics: How SIEM Detects Unknown Threats

Detection and Response

Attacker Behavior Analytics: How SIEM Detects Unknown Threats

Eric Sun's avatar

Eric Sun

Georgia should not authorize "hack back"

Industry Trends

Georgia should not authorize "hack back"

Harley Geiger's avatar

Harley Geiger

Metasploit Wrapup 4/13/18

Products and Tools

Metasploit Wrapup 4/13/18

Jacob Robles's avatar

Jacob Robles

Threat Intel Book Club: The Cuckoo's Egg wrap-up

Threat Research

Threat Intel Book Club: The Cuckoo's Egg wrap-up

Caitlin Condon's avatar

Caitlin Condon

How DevOps Can Use Quality Gates for Security Checks

Security Operations

How DevOps Can Use Quality Gates for Security Checks

Alfred Chung's avatar

Alfred Chung

Patch Tuesday - April 2018

Exposure Management

Patch Tuesday - April 2018

Greg Wiseman's avatar

Greg Wiseman

Shoring Up the Defenses Together: 2018Q1 Wrap-Up

Vulnerabilities and Exploits

Shoring Up the Defenses Together: 2018Q1 Wrap-Up

Sam Huckins's avatar

Sam Huckins

CIS Critical Security Control 13:  Data Protection Explained

Security Operations

CIS Critical Security Control 13: Data Protection Explained

Michael Cole's avatar

Michael Cole

Metasploit Wrapup 4/7/18

Products and Tools

Metasploit Wrapup 4/7/18

Brendan Watters's avatar

Brendan Watters

Metasploit Wrapup 4/2/18

Products and Tools

Metasploit Wrapup 4/2/18

Brent Cook's avatar

Brent Cook

CIS Critical Control 12: Boundary Defense Explained

Security Operations

CIS Critical Control 12: Boundary Defense Explained

Christy Draicchio's avatar

Christy Draicchio