The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

You Need To Understand Lateral Movement To Detect More Attacks

Detection and Response

You Need To Understand Lateral Movement To Detect More Attacks

Matt Hathaway's avatar

Matt Hathaway

The SOC of the Future: Predictions from the Front Line

Security Operations

The SOC of the Future: Predictions from the Front Line

Rapid7's avatar

Rapid7

What Makes SIEMs So Challenging?

Detection and Response

What Makes SIEMs So Challenging?

Spencer Engleson's avatar

Spencer Engleson

Integrating the Logentries Javascript Library With React

Products and Tools

Integrating the Logentries Javascript Library With React

Rapid7's avatar

Rapid7

Introduction to osquery for Threat Detection and DFIR

Products and Tools

Introduction to osquery for Threat Detection and DFIR

Rapid7's avatar

Rapid7

SNMP Data Harvesting During Penetration Testing

Exposure Management

SNMP Data Harvesting During Penetration Testing

Deral Heiland's avatar

Deral Heiland

Queuing tasks with Redis

Products and Tools

Queuing tasks with Redis

Rapid7's avatar

Rapid7

Detect Corporate Identity Theft with a New Intruder Trap: Honey Credentials

Detection and Response

Detect Corporate Identity Theft with a New Intruder Trap: Honey Credentials

Eric Sun's avatar

Eric Sun

The 2016 Verizon Data Breach Investigations Report (DBIR) Summary - The Defender's Perspective

Threat Research

The 2016 Verizon Data Breach Investigations Report (DBIR) Summary - The Defender's Perspective

boB Rudis's avatar

boB Rudis

Detect Unknown Spear Phishing Attacks

Products and Tools

Detect Unknown Spear Phishing Attacks

Eric Sun's avatar

Eric Sun

How to Ensure Self Describing Log Data Using Log4Net

Products and Tools

How to Ensure Self Describing Log Data Using Log4Net

Rapid7's avatar

Rapid7

Insight Platform Now Compliant with European Data Hosting Requirement

Products and Tools

Insight Platform Now Compliant with European Data Hosting Requirement

Eric Sun's avatar

Eric Sun

Designing Authentication

Rapid7 Blog

Designing Authentication

Ceara McCurdy's avatar

Ceara McCurdy

Nexpose Content Release Cadence

Exposure Management

Nexpose Content Release Cadence

dpicotte's avatar

dpicotte

Using the National Vunerability Database to Reveal Vulnerability Trends Over Time

Exposure Management

Using the National Vunerability Database to Reveal Vulnerability Trends Over Time

Ismail Guneydas's avatar

Ismail Guneydas

Using JavaScript to interact with the REST Query API

Products and Tools

Using JavaScript to interact with the REST Query API

Rapid7's avatar

Rapid7

How to: Send SMS messages to Logentries in under 5 minutes (maybe 10)

Products and Tools

How to: Send SMS messages to Logentries in under 5 minutes (maybe 10)

Rapid7's avatar

Rapid7

Adaptive Security: Rapid7 Critical Vulnerability Category

Exposure Management

Adaptive Security: Rapid7 Critical Vulnerability Category

Eray Yilmaz's avatar

Eray Yilmaz

What Security Operations Teams Can Learn From Modern Productivity Software

Security Operations

What Security Operations Teams Can Learn From Modern Productivity Software

Rapid7's avatar

Rapid7

On Badlock for Samba (CVE-2016-2118) and Windows (CVE-2016-0128)

Vulnerabilities and Exploits

On Badlock for Samba (CVE-2016-2118) and Windows (CVE-2016-0128)

Tod Beardsley's avatar

Tod Beardsley

How to Log from Azure Virtual Machines

Products and Tools

How to Log from Azure Virtual Machines

Rapid7's avatar

Rapid7