The Rapid7 Blog:
Your Signal in the Security Noise
Insights, stories, and guidance from our global security and research teams.
3612 Results

Detection and Response
You Need To Understand Lateral Movement To Detect More Attacks
Matt Hathaway
Security Operations
The SOC of the Future: Predictions from the Front Line
Rapid7

Detection and Response
What Makes SIEMs So Challenging?
Spencer Engleson

Products and Tools
Integrating the Logentries Javascript Library With React
Rapid7

Products and Tools
Introduction to osquery for Threat Detection and DFIR
Rapid7

Exposure Management
SNMP Data Harvesting During Penetration Testing
Deral Heiland

Products and Tools
Queuing tasks with Redis
Rapid7

Detection and Response
Detect Corporate Identity Theft with a New Intruder Trap: Honey Credentials
Eric Sun

Threat Research
The 2016 Verizon Data Breach Investigations Report (DBIR) Summary - The Defender's Perspective
boB Rudis

Products and Tools
Detect Unknown Spear Phishing Attacks
Eric Sun

Products and Tools
How to Ensure Self Describing Log Data Using Log4Net
Rapid7

Products and Tools
Insight Platform Now Compliant with European Data Hosting Requirement
Eric Sun

Rapid7 Blog
Designing Authentication
Ceara McCurdy

Exposure Management
Nexpose Content Release Cadence
dpicotte

Exposure Management
Using the National Vunerability Database to Reveal Vulnerability Trends Over Time
Ismail Guneydas

Products and Tools
Using JavaScript to interact with the REST Query API
Rapid7

Products and Tools
How to: Send SMS messages to Logentries in under 5 minutes (maybe 10)
Rapid7

Exposure Management
Adaptive Security: Rapid7 Critical Vulnerability Category
Eray Yilmaz
Security Operations
What Security Operations Teams Can Learn From Modern Productivity Software
Rapid7

Vulnerabilities and Exploits
On Badlock for Samba (CVE-2016-2118) and Windows (CVE-2016-0128)
Tod Beardsley

Products and Tools
How to Log from Azure Virtual Machines
Rapid7