The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Prepare for Battle: Let’s Build an Incident Response Plan (Part 3)

Detection and Response

Prepare for Battle: Let’s Build an Incident Response Plan (Part 3)

Eric Sun's avatar

Eric Sun

FCC Repeals Net Neutrality: What Now?

Industry Trends

FCC Repeals Net Neutrality: What Now?

Harley Geiger's avatar

Harley Geiger

Attention Humans: The ROBOT Attack

Industry Trends

Attention Humans: The ROBOT Attack

Tod Beardsley's avatar

Tod Beardsley

Creating a Risk-Based Vulnerability Management Program for GDPR with InsightVM

Products and Tools

Creating a Risk-Based Vulnerability Management Program for GDPR with InsightVM

Nathan Palanov's avatar

Nathan Palanov

6 Best Practices for Effective IT Troubleshooting

Detection and Response

6 Best Practices for Effective IT Troubleshooting

Robert Reselman's avatar

Robert Reselman

Patch Tuesday - December 2017

Exposure Management

Patch Tuesday - December 2017

Greg Wiseman's avatar

Greg Wiseman

The Magic Behind Managed Application Security Services

Cloud and Devops Security

The Magic Behind Managed Application Security Services

Kimberlee Bachman's avatar

Kimberlee Bachman

Metasploit Wrapup: Dec. 8, 2017

Products and Tools

Metasploit Wrapup: Dec. 8, 2017

Brendan Watters's avatar

Brendan Watters

Prepare for Battle: Let’s Build an Incident Response Plan (Part 2)

Detection and Response

Prepare for Battle: Let’s Build an Incident Response Plan (Part 2)

Eric Sun's avatar

Eric Sun

Standing with Massachusetts technology leaders in support of net neutrality

Industry Trends

Standing with Massachusetts technology leaders in support of net neutrality

Corey Thomas's avatar

Corey Thomas

2017 Gartner Magic Quadrant for SIEM: Rapid7 Named a Visionary

Detection and Response

2017 Gartner Magic Quadrant for SIEM: Rapid7 Named a Visionary

Eric Sun's avatar

Eric Sun

CVE-2017-10151: What You Need to Know About the Oracle Identity Manager Vulnerability

Products and Tools

CVE-2017-10151: What You Need to Know About the Oracle Identity Manager Vulnerability

Matthew Ferguson's avatar

Matthew Ferguson

GDPR Compliance Checklist: December – Assess & Review

Exposure Management

GDPR Compliance Checklist: December – Assess & Review

Sam Humphries's avatar

Sam Humphries

Metasploit Wrapup: Dec. 1, 2017

Products and Tools

Metasploit Wrapup: Dec. 1, 2017

Brendan Watters's avatar

Brendan Watters

Prepare for Battle: Let’s Build an Incident Response Plan (Part 1)

Detection and Response

Prepare for Battle: Let’s Build an Incident Response Plan (Part 1)

Eric Sun's avatar

Eric Sun

Announcing the Metasploitable3 Community CTF

Products and Tools

Announcing the Metasploitable3 Community CTF

Caitlin Condon's avatar

Caitlin Condon

InsightAppSec Feature Highlights: On-Premise Engines, JIRA Integration, and More

Products and Tools

InsightAppSec Feature Highlights: On-Premise Engines, JIRA Integration, and More

Alfred Chung's avatar

Alfred Chung

CVE-2017-16943: Exim BDAT Use-After-Free

Rapid7 Blog

CVE-2017-16943: Exim BDAT Use-After-Free

Tod Beardsley's avatar

Tod Beardsley

InsightIDR Monitors Win, Linux & Mac Endpoints

Detection and Response

InsightIDR Monitors Win, Linux & Mac Endpoints

Eric Sun's avatar

Eric Sun

Firewall Reporting Excessive SYN Packets? Check Rate of Connections

Detection and Response

Firewall Reporting Excessive SYN Packets? Check Rate of Connections

Rapid7's avatar

Rapid7

3 Steps to Building an Effective Log Management Policy

Security Operations

3 Steps to Building an Effective Log Management Policy

Robert Reselman's avatar

Robert Reselman