The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Patch Tuesday - August 2014

Detection and Response

Patch Tuesday - August 2014

Ross Barrett's avatar

Ross Barrett

JSON logging in Apache and Nginx with Logentries

Detection and Response

JSON logging in Apache and Nginx with Logentries

Rapid7's avatar

Rapid7

How D3 can help you build effective data visualizations

Products and Tools

How D3 can help you build effective data visualizations

Rapid7's avatar

Rapid7

Metasploit Race to Root and Loginpalooza

Rapid7 Blog

Metasploit Race to Root and Loginpalooza

Tod Beardsley's avatar

Tod Beardsley

I don't always write my own web application fingerprints, but when I do, I use XML

Rapid7 Blog

I don't always write my own web application fingerprints, but when I do, I use XML

Tom Hart's avatar

Tom Hart

Smart Continuous Delivery Using Automated Testing

Products and Tools

Smart Continuous Delivery Using Automated Testing

Rapid7's avatar

Rapid7

4 Ways to Use Centralized Log Management for Improved Production Monitoring

Detection and Response

4 Ways to Use Centralized Log Management for Improved Production Monitoring

Rapid7's avatar

Rapid7

Microsoft False Positives: "The update is not applicable to your computer"

Products and Tools

Microsoft False Positives: "The update is not applicable to your computer"

bjohnson's avatar

bjohnson

Weekly Metasploit Update: Countdown to DEFCON

Products and Tools

Weekly Metasploit Update: Countdown to DEFCON

Tod Beardsley's avatar

Tod Beardsley

Digging Deeper on AWS: Real-time Alerting for Windows Security Events

Products and Tools

Digging Deeper on AWS: Real-time Alerting for Windows Security Events

Rapid7's avatar

Rapid7

Revisiting the Past with Logentries and Syslog

Detection and Response

Revisiting the Past with Logentries and Syslog

Rapid7's avatar

Rapid7

AWS CloudWatch Logs - Making Innovation Easier and Cheaper

Detection and Response

AWS CloudWatch Logs - Making Innovation Easier and Cheaper

Rapid7's avatar

Rapid7

Weekly Metasploit Update: Embedded Device Attacks and Automated Syntax Analysis

Detection and Response

Weekly Metasploit Update: Embedded Device Attacks and Automated Syntax Analysis

Tod Beardsley's avatar

Tod Beardsley

Logs to Metrics to JSON to Geckoboard

Security Operations

Logs to Metrics to JSON to Geckoboard

Rapid7's avatar

Rapid7

TCP or UDP for Logging – Which One to Use?

Products and Tools

TCP or UDP for Logging – Which One to Use?

Rapid7's avatar

Rapid7

Using Log Analysis to Find the .18%

Products and Tools

Using Log Analysis to Find the .18%

Rapid7's avatar

Rapid7

Weekly Metasploit Update: Another Meterpreter Evasion Option

Products and Tools

Weekly Metasploit Update: Another Meterpreter Evasion Option

Tod Beardsley's avatar

Tod Beardsley

How to Get Full Visibility of CloudTrail, CloudWatch & System Logs

Security Operations

How to Get Full Visibility of CloudTrail, CloudWatch & System Logs

Rapid7's avatar

Rapid7

Metasploit Weekly Update: Prison Break

Rapid7 Blog

Metasploit Weekly Update: Prison Break

Wei Chen's avatar

Wei Chen

Google Cloud DataFlow – A Game Changer?

Products and Tools

Google Cloud DataFlow – A Game Changer?

Rapid7's avatar

Rapid7

Gartner calls for rebalancing security budgets: invest more in detection vs. prevention

Rapid7 Blog

Gartner calls for rebalancing security budgets: invest more in detection vs. prevention

lasherdotan's avatar

lasherdotan