The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Three Switching Costs to Consider When Evaluating a New Vulnerability Management Solution

Products and Tools

Three Switching Costs to Consider When Evaluating a New Vulnerability Management Solution

Tori Sitcawich's avatar

Tori Sitcawich

DivvyCloud by Rapid7 Announces New Infrastructure as Code Security Capability

Products and Tools

DivvyCloud by Rapid7 Announces New Infrastructure as Code Security Capability

Jackie Fekeci's avatar

Jackie Fekeci

Preparing for the Cybersecurity Maturity Model Certification (CMMC), Part 2: The Larger Picture

Rapid7 Blog

Preparing for the Cybersecurity Maturity Model Certification (CMMC), Part 2: The Larger Picture

Brian Carey's avatar

Brian Carey

Optimizing Security in the Work-From-Home Era

Security Operations

Optimizing Security in the Work-From-Home Era

boB Rudis's avatar

boB Rudis

May 2020 Cisco Remote Vulnerabilities Guidance

Vulnerabilities and Exploits

May 2020 Cisco Remote Vulnerabilities Guidance

boB Rudis's avatar

boB Rudis

Metasploit Wrap-Up: May 8, 2020

Products and Tools

Metasploit Wrap-Up: May 8, 2020

Grant Willcox's avatar

Grant Willcox

Best Practices for Securing e-Commerce Applications

Products and Tools

Best Practices for Securing e-Commerce Applications

Bria Grangard's avatar

Bria Grangard

How to Increase Your Security Team's Visibility Within Your Organization—And What Happens When You Do

Products and Tools

How to Increase Your Security Team's Visibility Within Your Organization—And What Happens When You Do

Tori Sitcawich's avatar

Tori Sitcawich

Why SOAR Is an Essential Cybersecurity Tool for Financial Services Companies

Security Operations

Why SOAR Is an Essential Cybersecurity Tool for Financial Services Companies

Lauren Taylor's avatar

Lauren Taylor

5 Challenges Outsourced Detection and Response Operations Can Help Solve

Products and Tools

5 Challenges Outsourced Detection and Response Operations Can Help Solve

Ellis Fincham's avatar

Ellis Fincham

Metasploit Wrap-Up 5/1/20

Exposure Management

Metasploit Wrap-Up 5/1/20

Alan David Foster's avatar

Alan David Foster

Gartner® Recognizes Rapid7
 Vulnerability Management for Application Security Capabilities

Products and Tools

Gartner® Recognizes Rapid7 Vulnerability Management for Application Security Capabilities

Bria Grangard's avatar

Bria Grangard

Rapid7 Announces Intent to Acquire DivvyCloud

Cloud and Devops Security

Rapid7 Announces Intent to Acquire DivvyCloud

Lee Weiner's avatar

Lee Weiner

CVE-2020-12271: Sophos XG Firewall Pre-Auth SQL Injection Vulnerability Remediation Guidance and Exposure Overview

Vulnerabilities and Exploits

CVE-2020-12271: Sophos XG Firewall Pre-Auth SQL Injection Vulnerability Remediation Guidance and Exposure Overview

boB Rudis's avatar

boB Rudis

The Healthcare Security Pro's Guide to Ransomware Attacks

Industry Trends

The Healthcare Security Pro's Guide to Ransomware Attacks

Jeremiah Dewey's avatar

Jeremiah Dewey

Metasploit Wrap-Up 4/24/20

Exposure Management

Metasploit Wrap-Up 4/24/20

Adam Cammack's avatar

Adam Cammack

Stuck Inside? Top Books We Recommend Security Pros Read During Quarantine

Rapid7 Blog

Stuck Inside? Top Books We Recommend Security Pros Read During Quarantine

Bri Hand's avatar

Bri Hand

How InsightIDR Is Accelerating Detection and Response in Modern Environments

Detection and Response

How InsightIDR Is Accelerating Detection and Response in Modern Environments

Margaret Wei's avatar

Margaret Wei

Confessions of a Former CISO: Promoting Individual Contributors into Leadership Roles

Security Operations

Confessions of a Former CISO: Promoting Individual Contributors into Leadership Roles

Scott King's avatar

Scott King

Resources on the Main Street Lending Program to Support Small and Mid-Sized Businesses

Rapid7 Blog

Resources on the Main Street Lending Program to Support Small and Mid-Sized Businesses

Harley Geiger's avatar

Harley Geiger

Metasploit Wrap-Up: Apr. 17, 2020

Exposure Management

Metasploit Wrap-Up: Apr. 17, 2020

Spencer McIntyre's avatar

Spencer McIntyre