The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

The Digital Citizen’s Guide to Navigating Cyber Conflict

Industry Trends

The Digital Citizen’s Guide to Navigating Cyber Conflict

Jen Ellis's avatar

Jen Ellis

4 Fallacies That Keep SMBs Vulnerable to Ransomware, Pt. 1

Exposure Management

4 Fallacies That Keep SMBs Vulnerable to Ransomware, Pt. 1

Ryan Weeks's avatar

Ryan Weeks

Reflecting on Women’s History Month at Rapid7

Rapid7 Blog

Reflecting on Women’s History Month at Rapid7

Rapid7's avatar

Rapid7

SIEM and XDR: What’s Converging, What’s Not

Products and Tools

SIEM and XDR: What’s Converging, What’s Not

Amy Hunt's avatar

Amy Hunt

Rapid7 Recognized as Top Ranked in Forrester Wave™ for Cloud Workload Security

Threat Research

Rapid7 Recognized as Top Ranked in Forrester Wave™ for Cloud Workload Security

Ben Austin's avatar

Ben Austin

8 Tips for Securing Networks When Time Is Scarce

Threat Research

8 Tips for Securing Networks When Time Is Scarce

Erick Galinkin's avatar

Erick Galinkin

Cloud Pentesting, Pt. 1: Breaking Down the Basics

Exposure Management

Cloud Pentesting, Pt. 1: Breaking Down the Basics

Eric Mortaro's avatar

Eric Mortaro

Metasploit Weekly Wrap-Up: Mar. 18, 2022

Exposure Management

Metasploit Weekly Wrap-Up: Mar. 18, 2022

Alan David Foster's avatar

Alan David Foster

3 Ways to Leverage the MITRE ATT&CK Framework

Security Operations

3 Ways to Leverage the MITRE ATT&CK Framework

KJ McCann's avatar

KJ McCann

The VM Lifecycle: How We Got Here, and Where We’re Going

Security Operations

The VM Lifecycle: How We Got Here, and Where We’re Going

Devin Krugly's avatar

Devin Krugly

Cybercriminals’ Recruiting Effort Highlights Need for Proper User Access Controls

Security Operations

Cybercriminals’ Recruiting Effort Highlights Need for Proper User Access Controls

Jeremy Makowski's avatar

Jeremy Makowski

InsightVM Scanning: Demystifying SSH Credential Elevation

Products and Tools

InsightVM Scanning: Demystifying SSH Credential Elevation

Emmett Kelly's avatar

Emmett Kelly

An Inside Look at CISA’s Supply Chain Task Force

Industry Trends

An Inside Look at CISA’s Supply Chain Task Force

Chad Kliewer, MS, CISSP, CCSP's avatar

Chad Kliewer, MS, CISSP, CCSP

Metasploit Weekly Wrap-Up: Mar. 11, 2022

Exposure Management

Metasploit Weekly Wrap-Up: Mar. 11, 2022

Jeffrey Martin's avatar

Jeffrey Martin

Run Faster Log Searches With InsightIDR

Products and Tools

Run Faster Log Searches With InsightIDR

Teresa Copple's avatar

Teresa Copple

7 Rapid Questions: Growing From BDR to Commercial Sales Manager With Maria Loughrey

Rapid7 Blog

7 Rapid Questions: Growing From BDR to Commercial Sales Manager With Maria Loughrey

Rapid7's avatar

Rapid7

New US Law to Require Cyber Incident Reports

Industry Trends

New US Law to Require Cyber Incident Reports

Harley Geiger's avatar

Harley Geiger

CVE-2022-0847: Arbitrary File Overwrite Vulnerability in Linux Kernel

Vulnerabilities and Exploits

CVE-2022-0847: Arbitrary File Overwrite Vulnerability in Linux Kernel

Caitlin Condon's avatar

Caitlin Condon

3 Reasons to Join Rapid7’s Cloud Security Summit

Cloud and Devops Security

3 Reasons to Join Rapid7’s Cloud Security Summit

Ben Austin's avatar

Ben Austin

Patch Tuesday - March 2022

Detection and Response

Patch Tuesday - March 2022

Greg Wiseman's avatar

Greg Wiseman

InsightVM Scan Engine: Understanding MAC Address Discovery

Products and Tools

InsightVM Scan Engine: Understanding MAC Address Discovery

Emmett Kelly's avatar

Emmett Kelly