The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

What Is Cloud Security Posture Management (CSPM)?

Products and Tools

What Is Cloud Security Posture Management (CSPM)?

David Mundy's avatar

David Mundy

SIEM Delivery Models: Where Do Today’s Risks and Future Technology Lead Us?

Products and Tools

SIEM Delivery Models: Where Do Today’s Risks and Future Technology Lead Us?

Meaghan Buchanan's avatar

Meaghan Buchanan

Investigating the Plumbing of the IoT Ecosystem (R7-2018-65, R7-2019-07) (FIXED)

Detection and Response

Investigating the Plumbing of the IoT Ecosystem (R7-2018-65, R7-2019-07) (FIXED)

Tod Beardsley's avatar

Tod Beardsley

Metasploit Wrap-Up: May 17, 2019

Products and Tools

Metasploit Wrap-Up: May 17, 2019

Aaron Soto's avatar

Aaron Soto

The Last Chip

Rapid7 Blog

The Last Chip

Christina Luconi's avatar

Christina Luconi

How SOAR Is Disrupting Traditional Vulnerability Management

Security Operations

How SOAR Is Disrupting Traditional Vulnerability Management

Justin Buchanan's avatar

Justin Buchanan

WannaCry, Two Years On: Current Threat Landscape

Detection and Response

WannaCry, Two Years On: Current Threat Landscape

boB Rudis's avatar

boB Rudis

Medical Device Security, Part 3: Putting Safe Scanning into Practice

Industry Trends

Medical Device Security, Part 3: Putting Safe Scanning into Practice

Joe Agnew's avatar

Joe Agnew

Metasploit Wrap-Up 5/10/19

Products and Tools

Metasploit Wrap-Up 5/10/19

Pearce Barry's avatar

Pearce Barry

Extracting Firmware from Microcontrollers’ 
Onboard Flash Memory, Part 4

Detection and Response

Extracting Firmware from Microcontrollers’ Onboard Flash Memory, Part 4

Deral Heiland's avatar

Deral Heiland

Medical Device Security, Part 2: How to Give Medical Devices a Security Checkup

Industry Trends

Medical Device Security, Part 2: How to Give Medical Devices a Security Checkup

Cody Florek's avatar

Cody Florek

Metasploit Wrap-Up 5/3/19

Products and Tools

Metasploit Wrap-Up 5/3/19

James Barnett's avatar

James Barnett

How InsightAppSec Can Help You Improve Your Approach to Application Security

Products and Tools

How InsightAppSec Can Help You Improve Your Approach to Application Security

Dan Kuÿkendall's avatar

Dan Kuÿkendall

Extracting Firmware from Microcontrollers' 
Onboard Flash Memory, Part 3: Microchip PIC Microcontrollers

Threat Research

Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 3: Microchip PIC Microcontrollers

Deral Heiland's avatar

Deral Heiland

Medical Device Security, Part 1: How to Scan Devices Without Letting Safety Flatline

Industry Trends

Medical Device Security, Part 1: How to Scan Devices Without Letting Safety Flatline

Joe Agnew's avatar

Joe Agnew

Metasploit Wrap-Up 4/26/19

Products and Tools

Metasploit Wrap-Up 4/26/19

Wei Chen's avatar

Wei Chen

Extracting Firmware from Microcontrollers' 
Onboard Flash Memory, Part 2: Nordic RF Microcontrollers

Threat Research

Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 2: Nordic RF Microcontrollers

Deral Heiland's avatar

Deral Heiland

Capture the Flag: Red Team vs. Cloud SIEM

Detection and Response

Capture the Flag: Red Team vs. Cloud SIEM

Garrett Enochs's avatar

Garrett Enochs

Metasploit Wrap-Up 4/19/19

Products and Tools

Metasploit Wrap-Up 4/19/19

Jeffrey Martin's avatar

Jeffrey Martin

How to Choose the Right Application Security Tool for Your Organization

Products and Tools

How to Choose the Right Application Security Tool for Your Organization

Coreen Wilson's avatar

Coreen Wilson

Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 1: Atmel Microcontrollers

Detection and Response

Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 1: Atmel Microcontrollers

Deral Heiland's avatar

Deral Heiland