The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Single-Page Applications: The Journey So Far

Products and Tools

Single-Page Applications: The Journey So Far

Mark Hamill's avatar

Mark Hamill

Seeing Security Scale: Rapid7’s Recap of AWS re:Invent 2018

Security Operations

Seeing Security Scale: Rapid7’s Recap of AWS re:Invent 2018

Jay Brewer's avatar

Jay Brewer

Did You Remediate That? New InsightVM Executive Report Provides Key Details on Team Progress

Exposure Management

Did You Remediate That? New InsightVM Executive Report Provides Key Details on Team Progress

Alfred Chung's avatar

Alfred Chung

Congrats to the 2018 Metasploit Community CTF Winners

Products and Tools

Congrats to the 2018 Metasploit Community CTF Winners

Caitlin Condon's avatar

Caitlin Condon

Metasploit Wrapup 11/30/18

Products and Tools

Metasploit Wrapup 11/30/18

Adam Cammack's avatar

Adam Cammack

Automation: The Ultimate Enabler for Threat Detection and Response

Detection and Response

Automation: The Ultimate Enabler for Threat Detection and Response

Eric Sun's avatar

Eric Sun

Deploying Kubernetes Across Multiple Clouds

Cloud and Devops Security

Deploying Kubernetes Across Multiple Clouds

David Mundy's avatar

David Mundy

How Retailers Can Protect Against Magecart This Black Friday and Holiday Season

Threat Research

How Retailers Can Protect Against Magecart This Black Friday and Holiday Season

boB Rudis's avatar

boB Rudis

Rolling with Your Logs, Part 3: Using Regex to Expand Your Search Options

Products and Tools

Rolling with Your Logs, Part 3: Using Regex to Expand Your Search Options

Teresa Copple's avatar

Teresa Copple

Metasploit Wrapup 11/16/18

Products and Tools

Metasploit Wrapup 11/16/18

Matthew Kienow's avatar

Matthew Kienow

5 Tips For Monitoring Network Traffic on Your Network

Products and Tools

5 Tips For Monitoring Network Traffic on Your Network

Rapid7's avatar

Rapid7

[Q&A] Why Every Threat Detection Strategy Needs User Behavior Analytics

Detection and Response

[Q&A] Why Every Threat Detection Strategy Needs User Behavior Analytics

Christie Ott's avatar

Christie Ott

Rolling with Your Logs, Part 2: Advanced Mode Searches

Detection and Response

Rolling with Your Logs, Part 2: Advanced Mode Searches

Teresa Copple's avatar

Teresa Copple

Automate Insight Agent Deployment in AWS

Cloud and Devops Security

Automate Insight Agent Deployment in AWS

Ben Glass's avatar

Ben Glass

Metasploit Wrapup 11/9/18

Products and Tools

Metasploit Wrapup 11/9/18

Pearce Barry's avatar

Pearce Barry

Top 5 Cybersecurity Threats Healthcare Organizations Face

Industry Trends

Top 5 Cybersecurity Threats Healthcare Organizations Face

Kristina LeBlanc's avatar

Kristina LeBlanc

Rolling with Your Logs, Part 1: Your Guide to Log Search in InsightIDR

Detection and Response

Rolling with Your Logs, Part 1: Your Guide to Log Search in InsightIDR

Teresa Copple's avatar

Teresa Copple

Announcing the 2018 Metasploit Community CTF

Products and Tools

Announcing the 2018 Metasploit Community CTF

Caitlin Condon's avatar

Caitlin Condon

Metasploit Wrapup: 11/2/18

Products and Tools

Metasploit Wrapup: 11/2/18

Aaron Soto's avatar

Aaron Soto

Expanded Protections for Security Researchers Under DMCA Sec. 1201

Industry Trends

Expanded Protections for Security Researchers Under DMCA Sec. 1201

Harley Geiger's avatar

Harley Geiger

Three Expensive Security Operations Costs and How to Minimize Them with SOAR

Security Operations

Three Expensive Security Operations Costs and How to Minimize Them with SOAR

Christie Ott's avatar

Christie Ott