The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

SANS Review of Rapid7 UserInsight (now InsightUBA) for User Behavior Analytics and Incident Response

Detection and Response

SANS Review of Rapid7 UserInsight (now InsightUBA) for User Behavior Analytics and Incident Response

Christian Kirsch's avatar

Christian Kirsch

4 Tips to Help Model Your Security Program to the Attack Chain

Security Operations

4 Tips to Help Model Your Security Program to the Attack Chain

Eric Sun's avatar

Eric Sun

Calling Your Bluff: Behavior Analytics in Poker and Incident Detection

Detection and Response

Calling Your Bluff: Behavior Analytics in Poker and Incident Detection

Eric Sun's avatar

Eric Sun

Modern Applications Require Modern DAST Solutions

Cloud and Devops Security

Modern Applications Require Modern DAST Solutions

Kim Dinerman's avatar

Kim Dinerman

Brute Force Attacks Using US Census Bureau Data

Industry Trends

Brute Force Attacks Using US Census Bureau Data

Deral Heiland's avatar

Deral Heiland

What is Incident Detection and Response?

Detection and Response

What is Incident Detection and Response?

Katherine A. Hayes's avatar

Katherine A. Hayes

Infographic: What scares IT Professionals most about IT Infrastructure

Products and Tools

Infographic: What scares IT Professionals most about IT Infrastructure

Rapid7's avatar

Rapid7

Using Color within Data Visualization

Security Operations

Using Color within Data Visualization

Zarah Delrosario's avatar

Zarah Delrosario

Ransomware FAQ: Avoiding the latest trend in malware

Vulnerabilities and Exploits

Ransomware FAQ: Avoiding the latest trend in malware

Tod Beardsley's avatar

Tod Beardsley

Do You Still Email Yourself from Your Code?  How to Stop the Madness

Products and Tools

Do You Still Email Yourself from Your Code? How to Stop the Madness

Rapid7's avatar

Rapid7

What's the Difference Between InsightIDR & InsightUBA?

Products and Tools

What's the Difference Between InsightIDR & InsightUBA?

Eric Sun's avatar

Eric Sun

The 4 Steps for Creating a Log Enabled Marketing Campaign

Products and Tools

The 4 Steps for Creating a Log Enabled Marketing Campaign

Rapid7's avatar

Rapid7

R7-2016-02: Multiple Vulnerabilities in ManageEngine OpUtils

Vulnerabilities and Exploits

R7-2016-02: Multiple Vulnerabilities in ManageEngine OpUtils

Tod Beardsley's avatar

Tod Beardsley

R7-2016-01: Null Credential on Moxa NPort (CVE-2016-1529)

Vulnerabilities and Exploits

R7-2016-01: Null Credential on Moxa NPort (CVE-2016-1529)

Tod Beardsley's avatar

Tod Beardsley

How to use Nexpose to find all assets affected by DROWN

Detection and Response

How to use Nexpose to find all assets affected by DROWN

Joakim Kennedy's avatar

Joakim Kennedy

Rapid7, Bugcrowd, and HackerOne file pro-researcher comments on DMCA Sec. 1201

Industry Trends

Rapid7, Bugcrowd, and HackerOne file pro-researcher comments on DMCA Sec. 1201

Harley Geiger's avatar

Harley Geiger

Brics Vs RE2/J

Products and Tools

Brics Vs RE2/J

Rapid7's avatar

Rapid7

Weekly Metasploit Wrapup: March 14, 2016

Products and Tools

Weekly Metasploit Wrapup: March 14, 2016

William Vu's avatar

William Vu

A point of @Contention- cache coherence on the JVM

Products and Tools

A point of @Contention- cache coherence on the JVM

Rapid7's avatar

Rapid7

Atomic Design @ Rapid7

Rapid7 Blog

Atomic Design @ Rapid7

Shannon Cooper's avatar

Shannon Cooper

Threat Intelligence Foundations: Crawl, Walk, Analyze - Part 3

Threat Research

Threat Intelligence Foundations: Crawl, Walk, Analyze - Part 3

Rebekah Brown's avatar

Rebekah Brown