The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Designing Authentication

Rapid7 Blog

Designing Authentication

Ceara McCurdy's avatar

Ceara McCurdy

Nexpose Content Release Cadence

Exposure Management

Nexpose Content Release Cadence

dpicotte's avatar

dpicotte

Using the National Vunerability Database to Reveal Vulnerability Trends Over Time

Exposure Management

Using the National Vunerability Database to Reveal Vulnerability Trends Over Time

Ismail Guneydas's avatar

Ismail Guneydas

Using JavaScript to interact with the REST Query API

Products and Tools

Using JavaScript to interact with the REST Query API

Rapid7's avatar

Rapid7

How to: Send SMS messages to Logentries in under 5 minutes (maybe 10)

Products and Tools

How to: Send SMS messages to Logentries in under 5 minutes (maybe 10)

Rapid7's avatar

Rapid7

Adaptive Security: Rapid7 Critical Vulnerability Category

Exposure Management

Adaptive Security: Rapid7 Critical Vulnerability Category

Eray Yilmaz's avatar

Eray Yilmaz

What Security Operations Teams Can Learn From Modern Productivity Software

Security Operations

What Security Operations Teams Can Learn From Modern Productivity Software

Rapid7's avatar

Rapid7

On Badlock for Samba (CVE-2016-2118) and Windows (CVE-2016-0128)

Vulnerabilities and Exploits

On Badlock for Samba (CVE-2016-2118) and Windows (CVE-2016-0128)

Tod Beardsley's avatar

Tod Beardsley

How to Log from Azure Virtual Machines

Products and Tools

How to Log from Azure Virtual Machines

Rapid7's avatar

Rapid7

The Dangers Of Linear Thinking and Why Security Analysts Should Defend in Graphs

Security Operations

The Dangers Of Linear Thinking and Why Security Analysts Should Defend in Graphs

Rapid7's avatar

Rapid7

How to Compare Google Compute Engine & AWS EC2

Products and Tools

How to Compare Google Compute Engine & AWS EC2

Rapid7's avatar

Rapid7

Vulnerability Disclosure and Handling Surveys - Really, What's the Point?

Exposure Management

Vulnerability Disclosure and Handling Surveys - Really, What's the Point?

Jen Ellis's avatar

Jen Ellis

Securing Your Metasploit Logs

Products and Tools

Securing Your Metasploit Logs

Justin Buchanan's avatar

Justin Buchanan

What is Security Orchestration?

Products and Tools

What is Security Orchestration?

Rapid7's avatar

Rapid7

Client Side Logging In Javascript

Rapid7 Blog

Client Side Logging In Javascript

Rapid7's avatar

Rapid7

IDC: 70% of Successful Breaches Originate on the Endpoint

Detection and Response

IDC: 70% of Successful Breaches Originate on the Endpoint

Christian Kirsch's avatar

Christian Kirsch

SANS Review of Rapid7 UserInsight (now InsightUBA) for User Behavior Analytics and Incident Response

Detection and Response

SANS Review of Rapid7 UserInsight (now InsightUBA) for User Behavior Analytics and Incident Response

Christian Kirsch's avatar

Christian Kirsch

4 Tips to Help Model Your Security Program to the Attack Chain

Security Operations

4 Tips to Help Model Your Security Program to the Attack Chain

Eric Sun's avatar

Eric Sun

Calling Your Bluff: Behavior Analytics in Poker and Incident Detection

Detection and Response

Calling Your Bluff: Behavior Analytics in Poker and Incident Detection

Eric Sun's avatar

Eric Sun

Modern Applications Require Modern DAST Solutions

Cloud and Devops Security

Modern Applications Require Modern DAST Solutions

Kim Dinerman's avatar

Kim Dinerman

Brute Force Attacks Using US Census Bureau Data

Industry Trends

Brute Force Attacks Using US Census Bureau Data

Deral Heiland's avatar

Deral Heiland