The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

MDR Vendor Must-Haves, Part 5: Multiple Threat Detection Methodologies, Including Deep Attacker Behavior Analysis

Detection and Response

MDR Vendor Must-Haves, Part 5: Multiple Threat Detection Methodologies, Including Deep Attacker Behavior Analysis

Jake Godgart's avatar

Jake Godgart

MDR Vendor Must-Haves, Part 4: Ingestion of Authentication Data Across Local, Domain, and Cloud Sources

Products and Tools

MDR Vendor Must-Haves, Part 4: Ingestion of Authentication Data Across Local, Domain, and Cloud Sources

Jake Godgart's avatar

Jake Godgart

MDR Vendor Must-Haves, Part 3: Ingestion of Other Technology Investments

Products and Tools

MDR Vendor Must-Haves, Part 3: Ingestion of Other Technology Investments

Jake Godgart's avatar

Jake Godgart

MDR Vendor Must-Haves, Part 2: Ingestion of Network Device Data

Products and Tools

MDR Vendor Must-Haves, Part 2: Ingestion of Network Device Data

Jake Godgart's avatar

Jake Godgart

Attack vs. Data: What You Need to Know About Threat Hunting

Products and Tools

Attack vs. Data: What You Need to Know About Threat Hunting

Jeffrey Gardner's avatar

Jeffrey Gardner

Rapid7 Recognized as a Strong Performer in the Inaugural Forrester Wave™ for MDR, Q1 2021

Products and Tools

Rapid7 Recognized as a Strong Performer in the Inaugural Forrester Wave™ for MDR, Q1 2021

Jake Godgart's avatar

Jake Godgart

MDR Vendor Must-Haves, Part 1: Deep Observation of Real-Time Endpoint Data

Products and Tools

MDR Vendor Must-Haves, Part 1: Deep Observation of Real-Time Endpoint Data

Jake Godgart's avatar

Jake Godgart

Defending Against the Zero Day: Analyzing Attacker Behavior Post-Exploitation of Microsoft Exchange

Products and Tools

Defending Against the Zero Day: Analyzing Attacker Behavior Post-Exploitation of Microsoft Exchange

Eoin Miller's avatar

Eoin Miller

InsightIDR’s NTA Capabilities Expanded to AWS

Products and Tools

InsightIDR’s NTA Capabilities Expanded to AWS

Aaron Sawitsky's avatar

Aaron Sawitsky

Talkin’ SMAC: Alert Labeling and Why It Matters

Products and Tools

Talkin’ SMAC: Alert Labeling and Why It Matters

matthew berninger's avatar

matthew berninger

PSA: Increase in RDP Attacks Means It's Time to Mind Your RDPs and Qs

Vulnerabilities and Exploits

PSA: Increase in RDP Attacks Means It's Time to Mind Your RDPs and Qs

boB Rudis's avatar

boB Rudis

Rapid7 Introduces “Active Response” for End-to-End Detection and Response

Products and Tools

Rapid7 Introduces “Active Response” for End-to-End Detection and Response

Jake Godgart's avatar

Jake Godgart

Rapid7 Named a Leader in the 2020 Forrester Wave™ for Midsize Managed Security Services Providers, Q3 2020

Threat Research

Rapid7 Named a Leader in the 2020 Forrester Wave™ for Midsize Managed Security Services Providers, Q3 2020

Jake Godgart's avatar

Jake Godgart

Rapid7 Managed Detection and Response: The Service that Never Sleeps

Products and Tools

Rapid7 Managed Detection and Response: The Service that Never Sleeps

Rashmi Joshi's avatar

Rashmi Joshi

Maturing Your Security Posture: Around-the-Clock Threat Detection With Managed Detection & Response (MDR) Services

Products and Tools

Maturing Your Security Posture: Around-the-Clock Threat Detection With Managed Detection & Response (MDR) Services

Rapid7's avatar

Rapid7

Managing Cybersecurity in the Real Estate Industry

Industry Trends

Managing Cybersecurity in the Real Estate Industry

Lauren Taylor's avatar

Lauren Taylor

Moving Toward a Better Signature Metric in SOCs: Detection Efficacy

Products and Tools

Moving Toward a Better Signature Metric in SOCs: Detection Efficacy

matthew berninger's avatar

matthew berninger

5 Challenges Outsourced Detection and Response Operations Can Help Solve

Products and Tools

5 Challenges Outsourced Detection and Response Operations Can Help Solve

Ellis Fincham's avatar

Ellis Fincham

Uncooking Eggs: Manual Dridex Dropper Malicious Document Deobfuscation Methods

Detection and Response

Uncooking Eggs: Manual Dridex Dropper Malicious Document Deobfuscation Methods

Wade Hickey's avatar

Wade Hickey

How MDR SOC Customer Tony Hamil Leverages the Automation of InsightConnect

Security Operations

How MDR SOC Customer Tony Hamil Leverages the Automation of InsightConnect

Rapid7's avatar

Rapid7

Rapid7 Named a Leader in Gartner Magic Quadrant for Security Information and Event Management (SIEM)

Products and Tools

Rapid7 Named a Leader in Gartner Magic Quadrant for Security Information and Event Management (SIEM)

Meaghan Buchanan's avatar

Meaghan Buchanan