The Rapid7 Blog:
Your Signal in the Security Noise
Insights, stories, and guidance from our global security and research teams.
3612 Results

Products and Tools
MDR Must-Haves, Part 6: Threat Validation and Detailed Reporting
Jake Godgart

Products and Tools
Metasploit Wrap-Up: 4/9/21
Dean Welch
Detection and Response
MDR Vendor Must-Haves, Part 5: Multiple Threat Detection Methodologies, Including Deep Attacker Behavior Analysis
Jake Godgart

Products and Tools
What’s New in InsightIDR: Q1 2021 in Review
Margaret Wei

Industry Trends
Attackers Targeting Fortinet Devices and SAP Applications
Caitlin Condon

Cloud and Devops Security
Kubernetes Namespaces Are Not as Secure as You Think
Sagi Rosenthal

Products and Tools
Looking Back and Moving Forward With Rapid7’s Cloud Security Solution
Jamie Gale

Products and Tools
MDR Vendor Must-Haves, Part 4: Ingestion of Authentication Data Across Local, Domain, and Cloud Sources
Jake Godgart

Threat Research
Rapid7 Releases New Industry Cyber-Exposure Report (ICER): Fortune 500
Tod Beardsley

Products and Tools
What’s New in InsightAppSec and tCell: Q1 2021 in Review
Rapid7

Exposure Management
Metasploit Wrap-Up 4/2/21
Brendan Watters

Products and Tools
MDR Vendor Must-Haves, Part 3: Ingestion of Other Technology Investments
Jake Godgart

Exposure Management
SolarWinds Patches Four New Vulnerabilities in Their Orion Platform
boB Rudis

Products and Tools
MDR Vendor Must-Haves, Part 2: Ingestion of Network Device Data
Jake Godgart

Exposure Management
Metasploit Wrap-Up: 3/26/21
Christopher Granleese

Products and Tools
DivvyCloud Adds Support for IAM Analyzer Policy Recommendations
Chris DeRamus

Products and Tools
Attack vs. Data: What You Need to Know About Threat Hunting
Jeffrey Gardner

Products and Tools
Rapid7 Recognized as a Strong Performer in the Inaugural Forrester Wave™ for MDR, Q1 2021
Jake Godgart

Products and Tools
MDR Vendor Must-Haves, Part 1: Deep Observation of Real-Time Endpoint Data
Jake Godgart

Products and Tools
Defending Against the Zero Day: Analyzing Attacker Behavior Post-Exploitation of Microsoft Exchange
Eoin Miller

Products and Tools
SOC Automation with InsightIDR and InsightConnect
Sydney Coffaro