The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

A Chat with Jonathan Cran About Intrigue and Security in the COVID-19 Pandemic

Industry Trends

A Chat with Jonathan Cran About Intrigue and Security in the COVID-19 Pandemic

Bri Hand's avatar

Bri Hand

Working from Home? Wi-Fi Security and Tips and Tricks

Rapid7 Blog

Working from Home? Wi-Fi Security and Tips and Tricks

Tod Beardsley's avatar

Tod Beardsley

Metasploit Wrap-Up: 3/27/20

Products and Tools

Metasploit Wrap-Up: 3/27/20

Erin Bleiweiss's avatar

Erin Bleiweiss

How to Participate in Our Metasploit Pro Customer Survey

Products and Tools

How to Participate in Our Metasploit Pro Customer Survey

Oriana Ott's avatar

Oriana Ott

Rapid7 Named a March 2020 Gartner Peer Insights Customers’ Choice for Vulnerability Assessment

Products and Tools

Rapid7 Named a March 2020 Gartner Peer Insights Customers’ Choice for Vulnerability Assessment

Rapid7's avatar

Rapid7

Automating Multi-Factor Authentication: Time-Based One-Time Passwords

Products and Tools

Automating Multi-Factor Authentication: Time-Based One-Time Passwords

Robert Lerner's avatar

Robert Lerner

Active Exploitation of Unpatched Windows Font Parsing Vulnerability

Exposure Management

Active Exploitation of Unpatched Windows Font Parsing Vulnerability

Brent Cook's avatar

Brent Cook

Cybersecurity Vulnerability Disclosure in Trade Agreements

Industry Trends

Cybersecurity Vulnerability Disclosure in Trade Agreements

Harley Geiger's avatar

Harley Geiger

Metasploit Wrap-Up: 3/20/20

Products and Tools

Metasploit Wrap-Up: 3/20/20

Shelby Pace's avatar

Shelby Pace

The Importance of Network Visibility With a Remote Workforce

Products and Tools

The Importance of Network Visibility With a Remote Workforce

Darragh Delaney's avatar

Darragh Delaney

How to Maintain Your Cybersecurity Posture in Uncertain Times

Rapid7 Blog

How to Maintain Your Cybersecurity Posture in Uncertain Times

Scott King's avatar

Scott King

Redefining How to Measure the Success of Your Vulnerability Management Program

Products and Tools

Redefining How to Measure the Success of Your Vulnerability Management Program

Justin Buchanan's avatar

Justin Buchanan

How Rapid7 Customer Hilltop Holdings Integrates Security Tools for a Multi-Layered Approach

Rapid7 Blog

How Rapid7 Customer Hilltop Holdings Integrates Security Tools for a Multi-Layered Approach

Lauren Taylor's avatar

Lauren Taylor

Our Commitment to Keeping Your Organization Secure During COVID-19

Rapid7 Blog

Our Commitment to Keeping Your Organization Secure During COVID-19

Corey Thomas's avatar

Corey Thomas

How to WFH and Keep Your Digital Self Safe

Rapid7 Blog

How to WFH and Keep Your Digital Self Safe

Shawn Valle's avatar

Shawn Valle

Metasploit Wrap-Up: 3/13/20

Products and Tools

Metasploit Wrap-Up: 3/13/20

Dean Welch's avatar

Dean Welch

How to Understand the TCO and ROI of Your Vulnerability Management Program

Products and Tools

How to Understand the TCO and ROI of Your Vulnerability Management Program

Tori Sitcawich's avatar

Tori Sitcawich

CVE-2020-0796: Microsoft SMBv3 Remote Code Execution Vulnerability Analysis

Threat Research

CVE-2020-0796: Microsoft SMBv3 Remote Code Execution Vulnerability Analysis

Bryce Abdo's avatar

Bryce Abdo

3 Common Threats to Look for in Your Network Data

Detection and Response

3 Common Threats to Look for in Your Network Data

Darragh Delaney's avatar

Darragh Delaney

Why Our Future in InfoSec Depends on Automation

Security Operations

Why Our Future in InfoSec Depends on Automation

Wade Woolwine's avatar

Wade Woolwine

Patch Tuesday - March 2020

Detection and Response

Patch Tuesday - March 2020

Richard Tsang's avatar

Richard Tsang