The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Welcome transparency on US government's process for disclosing vulnerabilities

Industry Trends

Welcome transparency on US government's process for disclosing vulnerabilities

Harley Geiger's avatar

Harley Geiger

Deploying CSP Properly

Rapid7 Blog

Deploying CSP Properly

Rapid7's avatar

Rapid7

Simplicity, Harmony, and Opportunity: Rapid7 Threat Report Q3 2017

Threat Research

Simplicity, Harmony, and Opportunity: Rapid7 Threat Report Q3 2017

Rebekah Brown's avatar

Rebekah Brown

Patch Tuesday - November 2017

Exposure Management

Patch Tuesday - November 2017

Greg Wiseman's avatar

Greg Wiseman

Takeaways from 2017 SANS State of Application Security Survey

Security Operations

Takeaways from 2017 SANS State of Application Security Survey

Alfred Chung's avatar

Alfred Chung

GDPR Preparation: November – Form & Storm

Exposure Management

GDPR Preparation: November – Form & Storm

Sam Humphries's avatar

Sam Humphries

Metasploit MinRID Option

Products and Tools

Metasploit MinRID Option

Ted Raffle's avatar

Ted Raffle

Metasploit Wrapup: Nov. 11, 2017

Products and Tools

Metasploit Wrapup: Nov. 11, 2017

Dev Mohanty's avatar

Dev Mohanty

Stopping Command Injection Attacks by Instrumenting Application Runtimes

Rapid7 Blog

Stopping Command Injection Attacks by Instrumenting Application Runtimes

Paul Callahan's avatar

Paul Callahan

How to Securely Handle a Lost or Stolen Device: A Practical Workflow

Products and Tools

How to Securely Handle a Lost or Stolen Device: A Practical Workflow

Rapid7's avatar

Rapid7

NCSAM Security Crash Diet: Wrap-up

Industry Trends

NCSAM Security Crash Diet: Wrap-up

Tod Beardsley's avatar

Tod Beardsley

Testing Developer Security with Metasploit Pro Task Chains

Security Operations

Testing Developer Security with Metasploit Pro Task Chains

Pearce Barry's avatar

Pearce Barry

Faster Investigations, Closer Teamwork: InsightIDR Enhancements

Detection and Response

Faster Investigations, Closer Teamwork: InsightIDR Enhancements

Eric Sun's avatar

Eric Sun

Metasploit Wrapup: Nov. 3, 2017

Products and Tools

Metasploit Wrapup: Nov. 3, 2017

Brendan Watters's avatar

Brendan Watters

Changing the Corporate Network Attacker’s Risk-Reward Paradigm

Detection and Response

Changing the Corporate Network Attacker’s Risk-Reward Paradigm

Justin Houk's avatar

Justin Houk

Testing SMB Security with Metasploit Pro Task Chains: Part 2

Exposure Management

Testing SMB Security with Metasploit Pro Task Chains: Part 2

Wei Chen's avatar

Wei Chen

Security Career Paths: Common and Unique Roles

Products and Tools

Security Career Paths: Common and Unique Roles

Rapid7's avatar

Rapid7

NCSAM Security Crash Diet, Week 4: IoT

Detection and Response

NCSAM Security Crash Diet, Week 4: IoT

Rapid7's avatar

Rapid7

Testing SMB Server Security with Metasploit Pro Task Chains: Part 1

Security Operations

Testing SMB Server Security with Metasploit Pro Task Chains: Part 1

Wei Chen's avatar

Wei Chen

Metasploit Wrapup: Oct. 27, 2017

Exposure Management

Metasploit Wrapup: Oct. 27, 2017

Sam Huckins's avatar

Sam Huckins

Why Security Teams Should Embrace (Not Fear) Automation

Security Operations

Why Security Teams Should Embrace (Not Fear) Automation

Rapid7's avatar

Rapid7