The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Log Search Simplified

Detection and Response

Log Search Simplified

Laura Ellis's avatar

Laura Ellis

UX Research: Steps & Methodologies to Inform Product Redesign

Security Operations

UX Research: Steps & Methodologies to Inform Product Redesign

Mindy Maxwell's avatar

Mindy Maxwell

Get your work done even faster with the Logentries REST API

Products and Tools

Get your work done even faster with the Logentries REST API

Rapid7's avatar

Rapid7

Secure Password Storage in Web Apps

Products and Tools

Secure Password Storage in Web Apps

Rapid7's avatar

Rapid7

5 Reasons Companies Are Losing Security Talent (And What to Do)

Security Operations

5 Reasons Companies Are Losing Security Talent (And What to Do)

Rapid7's avatar

Rapid7

Filtering and Automated Decisions with PEG.js and React-Mentions

Security Operations

Filtering and Automated Decisions with PEG.js and React-Mentions

Rapid7's avatar

Rapid7

Hashing Infrastructures

Products and Tools

Hashing Infrastructures

Rapid7's avatar

Rapid7

Disaster Preparedness: It's Not Thought Of Until It Is Needed Most

Rapid7 Blog

Disaster Preparedness: It's Not Thought Of Until It Is Needed Most

Joel Cardella's avatar

Joel Cardella

Defining the Roles & Responsibilities of Your Security Team

Security Operations

Defining the Roles & Responsibilities of Your Security Team

Rapid7's avatar

Rapid7

Nexpose Now Notes: August 2016

Rapid7 Blog

Nexpose Now Notes: August 2016

Ken Mizota's avatar

Ken Mizota

Does Security Automation Mean SOC Employees Will Be Obsolete?

Security Operations

Does Security Automation Mean SOC Employees Will Be Obsolete?

Rapid7's avatar

Rapid7

SMB Security is so Simple - Take Advantage of it Now.

Rapid7 Blog

SMB Security is so Simple - Take Advantage of it Now.

kevinbeaver's avatar

kevinbeaver

Metasploit Weekly Wrapup: Aug. 12, 2016

Exposure Management

Metasploit Weekly Wrapup: Aug. 12, 2016

William Webb's avatar

William Webb

Using Log Data as Forensic Evidence

Products and Tools

Using Log Data as Forensic Evidence

Annie Hathaway's avatar

Annie Hathaway

4 Potential Security Issues Raised By Pokémon Go

Products and Tools

4 Potential Security Issues Raised By Pokémon Go

Rapid7's avatar

Rapid7

NIST 800-53 Control Mappings in SQL Query Export

Vulnerabilities and Exploits

NIST 800-53 Control Mappings in SQL Query Export

Jake Korona's avatar

Jake Korona

A Framework for Selecting and Implementing Security Tools Today

Security Operations

A Framework for Selecting and Implementing Security Tools Today

Rapid7's avatar

Rapid7

Building a Simple CLI Tool with Golang

Security Operations

Building a Simple CLI Tool with Golang

Rapid7's avatar

Rapid7

Bro Series: The Programming Language

Products and Tools

Bro Series: The Programming Language

Rapid7's avatar

Rapid7

Integrating Logentries with OpsGenie: 3 Easy Steps

Products and Tools

Integrating Logentries with OpsGenie: 3 Easy Steps

Rapid7's avatar

Rapid7

Defender Spotlight: April C. Wright of Verizon Enterprise Services

Security Operations

Defender Spotlight: April C. Wright of Verizon Enterprise Services

Rapid7's avatar

Rapid7