The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

New InsightIDR Detections Released

Products and Tools

New InsightIDR Detections Released

Matt Hathaway's avatar

Matt Hathaway

What is Penetration Testing?

Exposure Management

What is Penetration Testing?

Dustin Parry's avatar

Dustin Parry

Overview of 'online' algorithm using Standard Deviation example

Products and Tools

Overview of 'online' algorithm using Standard Deviation example

Rapid7's avatar

Rapid7

Establishing an Insider Threat Program for Your Organization

Exposure Management

Establishing an Insider Threat Program for Your Organization

Zach Lahey's avatar

Zach Lahey

Warning: This Blog Post Contains Multiple Hoorays! #sorrynotsorry

Detection and Response

Warning: This Blog Post Contains Multiple Hoorays! #sorrynotsorry

Sam Humphries's avatar

Sam Humphries

Creating your First Vulnerability Scan: Nexpose Starter Tips

Products and Tools

Creating your First Vulnerability Scan: Nexpose Starter Tips

Nathan Palanov's avatar

Nathan Palanov

NCSAM: Independent Research and IoT

Detection and Response

NCSAM: Independent Research and IoT

Tod Beardsley's avatar

Tod Beardsley

Logging OwnTracks to Logentries

Products and Tools

Logging OwnTracks to Logentries

Rapid7's avatar

Rapid7

Patch Tuesday, October 2016

Detection and Response

Patch Tuesday, October 2016

Adam Nowak's avatar

Adam Nowak

Pokemon Go, Security, and Obsolescence

Rapid7 Blog

Pokemon Go, Security, and Obsolescence

Brent Cook's avatar

Brent Cook

Logging Mosquitto Server logs (from Raspberry Pi) to Logentries

Products and Tools

Logging Mosquitto Server logs (from Raspberry Pi) to Logentries

Rapid7's avatar

Rapid7

Rapid7 On Top in SANS Top 20 Critical Security Controls

Exposure Management

Rapid7 On Top in SANS Top 20 Critical Security Controls

Kyle Flaherty's avatar

Kyle Flaherty

How Security Orchestration and Automation Saves up to 83% of Time Spent Investigating Alerts

Security Operations

How Security Orchestration and Automation Saves up to 83% of Time Spent Investigating Alerts

Rapid7's avatar

Rapid7

New and Improved Policy Manager

Industry Trends

New and Improved Policy Manager

Jane Man's avatar

Jane Man

R7-2016-07: Multiple Vulnerabilities in Animas OneTouch Ping Insulin Pump

Vulnerabilities and Exploits

R7-2016-07: Multiple Vulnerabilities in Animas OneTouch Ping Insulin Pump

Tod Beardsley's avatar

Tod Beardsley

Cross Site Scripting (XSS) Attacks

Products and Tools

Cross Site Scripting (XSS) Attacks

Rapid7's avatar

Rapid7

Simplifying BIG Data Within Information Security Applications

Products and Tools

Simplifying BIG Data Within Information Security Applications

Alessandra Savitski's avatar

Alessandra Savitski

38 Questions to Ask Your Next MDR Provider

Products and Tools

38 Questions to Ask Your Next MDR Provider

Kimberlee Bachman's avatar

Kimberlee Bachman

Defender Spotlight: Mike Arpaia of Kolide

Security Operations

Defender Spotlight: Mike Arpaia of Kolide

Rapid7's avatar

Rapid7

Live Monitoring with Endpoint Agents

Exposure Management

Live Monitoring with Endpoint Agents

Jane Man's avatar

Jane Man

Vulnerability Remediation with Nexpose

Products and Tools

Vulnerability Remediation with Nexpose

Jane Man's avatar

Jane Man