The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Understanding User Behavior Analytics

Detection and Response

Understanding User Behavior Analytics

Tod Beardsley's avatar

Tod Beardsley

Use DHCP Discovery to Implement Critical Security Control 1

Exposure Management

Use DHCP Discovery to Implement Critical Security Control 1

Bill Sharar's avatar

Bill Sharar

What is SQL Injection?

Vulnerabilities and Exploits

What is SQL Injection?

Trey Ford's avatar

Trey Ford

Changes to OVAL in Nexpose 6.0.6

Products and Tools

Changes to OVAL in Nexpose 6.0.6

Gauthaman Ravindran's avatar

Gauthaman Ravindran

Update Tuesday, November 2015

Detection and Response

Update Tuesday, November 2015

Adam Nowak's avatar

Adam Nowak

Getting Started with VERIS

Threat Research

Getting Started with VERIS

Trey Ford's avatar

Trey Ford

Replacing Pedantry with Positive Interaction

Rapid7 Blog

Replacing Pedantry with Positive Interaction

David Maloney's avatar

David Maloney

Security Budget Tips, from CISOs, for CISOs

Industry Trends

Security Budget Tips, from CISOs, for CISOs

Trey Ford's avatar

Trey Ford

Unleash the power of node.js for Shell  Scripting (Part 2)

Products and Tools

Unleash the power of node.js for Shell Scripting (Part 2)

Rapid7's avatar

Rapid7

What is VERIS?

Threat Research

What is VERIS?

Trey Ford's avatar

Trey Ford

Java 8: A quick introduction to Parallelism and the Spliterator

Products and Tools

Java 8: A quick introduction to Parallelism and the Spliterator

Rapid7's avatar

Rapid7

New DMCA Exemption is a Positive Step for Security Researchers

Industry Trends

New DMCA Exemption is a Positive Step for Security Researchers

Jen Ellis's avatar

Jen Ellis

8 Reasons Why SQL Injection Vulnerabilities Still Exist

Vulnerabilities and Exploits

8 Reasons Why SQL Injection Vulnerabilities Still Exist

Kim Dinerman's avatar

Kim Dinerman

Mobile application security: Lock the back door!

Products and Tools

Mobile application security: Lock the back door!

Kim Dinerman's avatar

Kim Dinerman

5 Tips for Dealing with Unusual Traffic Detected Notifications

Rapid7 Blog

5 Tips for Dealing with Unusual Traffic Detected Notifications

Darragh Delaney's avatar

Darragh Delaney

Unleash the power of node.js for Shell Scripting (Part 1)

Products and Tools

Unleash the power of node.js for Shell Scripting (Part 1)

Rapid7's avatar

Rapid7

Logging from Tableau for Successful DataOps

Products and Tools

Logging from Tableau for Successful DataOps

Rapid7's avatar

Rapid7

Metasploit Weekly Wrapup for 2015-10-15

Exposure Management

Metasploit Weekly Wrapup for 2015-10-15

Brent Cook's avatar

Brent Cook

Exploring Lambdas and Streams in Java 8

Products and Tools

Exploring Lambdas and Streams in Java 8

Rapid7's avatar

Rapid7

10 Best Practices for Log Management and Analytics

Products and Tools

10 Best Practices for Log Management and Analytics

Rapid7's avatar

Rapid7

Rapid7 Labs' Project Sonar - Nexpose Integration

Threat Research

Rapid7 Labs' Project Sonar - Nexpose Integration

Brady Wunsch's avatar

Brady Wunsch