The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Introducing LEQL: percentile() & median

Products and Tools

Introducing LEQL: percentile() & median

Rapid7's avatar

Rapid7

How Adaptive Security fits into your Vulnerability Management Program

Products and Tools

How Adaptive Security fits into your Vulnerability Management Program

Bill Sharar's avatar

Bill Sharar

The Internet of Gas Station Tank Gauges -- Take #2

Detection and Response

The Internet of Gas Station Tank Gauges -- Take #2

Jon Hart's avatar

Jon Hart

Understanding User Behavior Analytics

Detection and Response

Understanding User Behavior Analytics

Tod Beardsley's avatar

Tod Beardsley

Use DHCP Discovery to Implement Critical Security Control 1

Exposure Management

Use DHCP Discovery to Implement Critical Security Control 1

Bill Sharar's avatar

Bill Sharar

What is SQL Injection?

Vulnerabilities and Exploits

What is SQL Injection?

Trey Ford's avatar

Trey Ford

Changes to OVAL in Nexpose 6.0.6

Products and Tools

Changes to OVAL in Nexpose 6.0.6

Gauthaman Ravindran's avatar

Gauthaman Ravindran

Update Tuesday, November 2015

Detection and Response

Update Tuesday, November 2015

Adam Nowak's avatar

Adam Nowak

Getting Started with VERIS

Threat Research

Getting Started with VERIS

Trey Ford's avatar

Trey Ford

Replacing Pedantry with Positive Interaction

Rapid7 Blog

Replacing Pedantry with Positive Interaction

David Maloney's avatar

David Maloney

Security Budget Tips, from CISOs, for CISOs

Industry Trends

Security Budget Tips, from CISOs, for CISOs

Trey Ford's avatar

Trey Ford

Unleash the power of node.js for Shell  Scripting (Part 2)

Products and Tools

Unleash the power of node.js for Shell Scripting (Part 2)

Rapid7's avatar

Rapid7

What is VERIS?

Threat Research

What is VERIS?

Trey Ford's avatar

Trey Ford

Java 8: A quick introduction to Parallelism and the Spliterator

Products and Tools

Java 8: A quick introduction to Parallelism and the Spliterator

Rapid7's avatar

Rapid7

New DMCA Exemption is a Positive Step for Security Researchers

Industry Trends

New DMCA Exemption is a Positive Step for Security Researchers

Jen Ellis's avatar

Jen Ellis

8 Reasons Why SQL Injection Vulnerabilities Still Exist

Vulnerabilities and Exploits

8 Reasons Why SQL Injection Vulnerabilities Still Exist

Kim Dinerman's avatar

Kim Dinerman

Mobile application security: Lock the back door!

Products and Tools

Mobile application security: Lock the back door!

Kim Dinerman's avatar

Kim Dinerman

5 Tips for Dealing with Unusual Traffic Detected Notifications

Rapid7 Blog

5 Tips for Dealing with Unusual Traffic Detected Notifications

Darragh Delaney's avatar

Darragh Delaney

Unleash the power of node.js for Shell Scripting (Part 1)

Products and Tools

Unleash the power of node.js for Shell Scripting (Part 1)

Rapid7's avatar

Rapid7

Logging from Tableau for Successful DataOps

Products and Tools

Logging from Tableau for Successful DataOps

Rapid7's avatar

Rapid7

Metasploit Weekly Wrapup for 2015-10-15

Exposure Management

Metasploit Weekly Wrapup for 2015-10-15

Brent Cook's avatar

Brent Cook