The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Disaster Preparedness: It's Not Thought Of Until It Is Needed Most

Rapid7 Blog

Disaster Preparedness: It's Not Thought Of Until It Is Needed Most

Joel Cardella's avatar

Joel Cardella

Defining the Roles & Responsibilities of Your Security Team

Security Operations

Defining the Roles & Responsibilities of Your Security Team

Rapid7's avatar

Rapid7

Nexpose Now Notes: August 2016

Rapid7 Blog

Nexpose Now Notes: August 2016

Ken Mizota's avatar

Ken Mizota

Does Security Automation Mean SOC Employees Will Be Obsolete?

Security Operations

Does Security Automation Mean SOC Employees Will Be Obsolete?

Rapid7's avatar

Rapid7

SMB Security is so Simple - Take Advantage of it Now.

Rapid7 Blog

SMB Security is so Simple - Take Advantage of it Now.

kevinbeaver's avatar

kevinbeaver

Metasploit Weekly Wrapup: Aug. 12, 2016

Exposure Management

Metasploit Weekly Wrapup: Aug. 12, 2016

William Webb's avatar

William Webb

Using Log Data as Forensic Evidence

Products and Tools

Using Log Data as Forensic Evidence

Annie Hathaway's avatar

Annie Hathaway

4 Potential Security Issues Raised By Pokémon Go

Products and Tools

4 Potential Security Issues Raised By Pokémon Go

Rapid7's avatar

Rapid7

NIST 800-53 Control Mappings in SQL Query Export

Vulnerabilities and Exploits

NIST 800-53 Control Mappings in SQL Query Export

Jake Korona's avatar

Jake Korona

A Framework for Selecting and Implementing Security Tools Today

Security Operations

A Framework for Selecting and Implementing Security Tools Today

Rapid7's avatar

Rapid7

Building a Simple CLI Tool with Golang

Security Operations

Building a Simple CLI Tool with Golang

Rapid7's avatar

Rapid7

Bro Series: The Programming Language

Products and Tools

Bro Series: The Programming Language

Rapid7's avatar

Rapid7

Integrating Logentries with OpsGenie: 3 Easy Steps

Products and Tools

Integrating Logentries with OpsGenie: 3 Easy Steps

Rapid7's avatar

Rapid7

Defender Spotlight: April C. Wright of Verizon Enterprise Services

Security Operations

Defender Spotlight: April C. Wright of Verizon Enterprise Services

Rapid7's avatar

Rapid7

Pentesting in the Real World: Going Bananas with MongoDB

Exposure Management

Pentesting in the Real World: Going Bananas with MongoDB

Leon Johnson's avatar

Leon Johnson

Exporting Logentries data with Leexportpy

Products and Tools

Exporting Logentries data with Leexportpy

Rapid7's avatar

Rapid7

AppSpider application security scanning solution deepens support for Single Page Applications - ReactJS

Products and Tools

AppSpider application security scanning solution deepens support for Single Page Applications - ReactJS

David Howe's avatar

David Howe

What exactly is an Event-loop?

Products and Tools

What exactly is an Event-loop?

Rapid7's avatar

Rapid7

How Security Orchestration Can Stop Insider and Outsider Attacks

Security Operations

How Security Orchestration Can Stop Insider and Outsider Attacks

Rapid7's avatar

Rapid7

Pentesting in the Real World: Capturing Credentials on an Internal Network

Exposure Management

Pentesting in the Real World: Capturing Credentials on an Internal Network

Robert Stewart's avatar

Robert Stewart

Introduction to the Logentries Command Line Interface

Products and Tools

Introduction to the Logentries Command Line Interface

Rapid7's avatar

Rapid7