The Rapid7 Blog:
Your Signal in the Security Noise
Insights, stories, and guidance from our global security and research teams.
3615 Results

Products and Tools
Keep Your Code Clean while Logging
Rapid7
Security Operations
Local Cybersecurity Meetups Near You
Rapid7

Cloud and Devops Security
Honing Your Application Security Chops on DevSecOps
Brian O'Neill

Products and Tools
Announcement: End-of-Life Metasploit 32-Bit Versions
Leo Varela

Products and Tools
Self-describing Logging Using Log4J
Rapid7
Security Operations
The Best Strategies for a Successful Security Operations Center Explained by 4 Security Experts
Rapid7

Products and Tools
How Audit Logs Help Confirm and Correct Security Policy
Rapid7

Products and Tools
Signal AND Noise The Best of All Worlds for Logging
Rapid7
![Digging for Clam[AV]s with Project Sonar](/_next/image/?url=%2Fblog-post-image-placeholder.webp%3Fauto%3Davif&w=1920&q=75)
Threat Research
Digging for Clam[AV]s with Project Sonar
boB Rudis

Products and Tools
AWS Series: Creating a Privoxy, Tor Instance
Rapid7

Products and Tools
AWS Series: OpenSWAN L2TP over IPSEC VPN Configuration
Rapid7

Products and Tools
Bro Series: Creating a Bro Cluster
Rapid7

Exposure Management
Penetration Test vs. Red Team Assessment: The Age Old Debate of Pirates vs. Ninjas Continues
Kirk Hayes

Vulnerabilities and Exploits
R7-2016-06: Remote Code Execution via Swagger Parameter Injection (CVE-2016-5641)
Scott Davis

Products and Tools
Vulnerability Regression Monitoring With Nexpose
Francisco Slavin

Products and Tools
Migrating a web app to Angular
Rapid7

Products and Tools
Seven Ways InsightIDR Helps Maintain PCI Compliance
Eric Sun

Products and Tools
Webinar Recap: Tableau Server Log Analytics
Rapid7
Security Operations
Defender Spotlight: Ryan Huber of Slack
Rapid7

Products and Tools
Monitoring SNS Activity Using a Lambda Function and Logentries
Rapid7

Products and Tools
Checking Active Directory (AD) Security and Integrity via Log Monitoring
Rapid7