The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Patch Tuesday - May 2017

Detection and Response

Patch Tuesday - May 2017

Greg Wiseman's avatar

Greg Wiseman

ChatOps for Security Operations

Products and Tools

ChatOps for Security Operations

Rapid7's avatar

Rapid7

Metasploit Weekly Wrapup

Exposure Management

Metasploit Weekly Wrapup

Rapid7's avatar

Rapid7

2017 Verizon Data Breach Report (DBIR): Key Takeaways

Threat Research

2017 Verizon Data Breach Report (DBIR): Key Takeaways

boB Rudis's avatar

boB Rudis

3 Simple Ways to Approach Content Security Policy

Rapid7 Blog

3 Simple Ways to Approach Content Security Policy

Rapid7's avatar

Rapid7

Translating and Detecting Unicode Phishing Domains with Komand's Security Orchestration Platform

Security Operations

Translating and Detecting Unicode Phishing Domains with Komand's Security Orchestration Platform

Rapid7's avatar

Rapid7

Asia Cybersecurity Event Calendar [Free Shared Google Calendar]

Security Operations

Asia Cybersecurity Event Calendar [Free Shared Google Calendar]

Rapid7's avatar

Rapid7

A Privacy Stack for Protecting Your Data

Security Operations

A Privacy Stack for Protecting Your Data

Rapid7's avatar

Rapid7

R7-2017-02: Hyundai Blue Link Potential Info Disclosure (FIXED)

Vulnerabilities and Exploits

R7-2017-02: Hyundai Blue Link Potential Info Disclosure (FIXED)

Tod Beardsley's avatar

Tod Beardsley

Actionable Vulnerability Remediation Projects in InsightVM

Products and Tools

Actionable Vulnerability Remediation Projects in InsightVM

Jennifer Liou's avatar

Jennifer Liou

The CIS Critical Security Controls Explained - Control 6: Maintenance, Monitoring and Analysis of Audit Logs

Exposure Management

The CIS Critical Security Controls Explained - Control 6: Maintenance, Monitoring and Analysis of Audit Logs

Cindy Jones's avatar

Cindy Jones

Introduction to ISO/IEC 27035 - the ISO Standard on Incident Handling

Products and Tools

Introduction to ISO/IEC 27035 - the ISO Standard on Incident Handling

Rapid7's avatar

Rapid7

Introduction to ISO/IEC 27035 - Planning for and Detection of Incidents

Products and Tools

Introduction to ISO/IEC 27035 - Planning for and Detection of Incidents

Rapid7's avatar

Rapid7

Introduction to ISO/IEC 27035 - Assessment and Responding to Incidents

Products and Tools

Introduction to ISO/IEC 27035 - Assessment and Responding to Incidents

Rapid7's avatar

Rapid7

Introduction to ISO/IEC 27035 - More Details on Part 2 of the Standard

Products and Tools

Introduction to ISO/IEC 27035 - More Details on Part 2 of the Standard

Rapid7's avatar

Rapid7

Content Security Policy: Newer CSP Directives & Common Problems

Rapid7 Blog

Content Security Policy: Newer CSP Directives & Common Problems

Rapid7's avatar

Rapid7

Live Vulnerability Monitoring with Agents for Linux

Exposure Management

Live Vulnerability Monitoring with Agents for Linux

Ken Mizota's avatar

Ken Mizota

What is the Difference Between a SOC and a CSIRT?

Security Operations

What is the Difference Between a SOC and a CSIRT?

Rapid7's avatar

Rapid7

The CIS Critical Security Controls Series

Exposure Management

The CIS Critical Security Controls Series

Joel Cardella's avatar

Joel Cardella

Rapid7 urges NIST and NTIA to promote coordinated disclosure processes

Vulnerabilities and Exploits

Rapid7 urges NIST and NTIA to promote coordinated disclosure processes

Harley Geiger's avatar

Harley Geiger

The Shadow Brokers Leaked Exploits Explained

Products and Tools

The Shadow Brokers Leaked Exploits Explained

Rebekah Brown's avatar

Rebekah Brown