The Rapid7 Blog:
Your Signal in the Security Noise
Insights, stories, and guidance from our global security and research teams.
Featured posts
3616 Results

Products and Tools
Single-Page Applications: The Journey So Far
Mark Hamill
Security Operations
Seeing Security Scale: Rapid7’s Recap of AWS re:Invent 2018
Jay Brewer

Exposure Management
Did You Remediate That? New InsightVM Executive Report Provides Key Details on Team Progress
Alfred Chung

Products and Tools
Congrats to the 2018 Metasploit Community CTF Winners
Caitlin Condon

Products and Tools
Metasploit Wrapup 11/30/18
Adam Cammack

Detection and Response
Automation: The Ultimate Enabler for Threat Detection and Response
Eric Sun

Cloud and Devops Security
Deploying Kubernetes Across Multiple Clouds
David Mundy

Threat Research
How Retailers Can Protect Against Magecart This Black Friday and Holiday Season
boB Rudis

Products and Tools
Rolling with Your Logs, Part 3: Using Regex to Expand Your Search Options
Teresa Copple

Products and Tools
Metasploit Wrapup 11/16/18
Matthew Kienow

Products and Tools
5 Tips For Monitoring Network Traffic on Your Network
Rapid7
![[Q&A] Why Every Threat Detection Strategy Needs User Behavior Analytics](/_next/image/?url=%2Fblog-post-image-placeholder.webp%3Fauto%3Davif&w=1920&q=75)
Detection and Response
[Q&A] Why Every Threat Detection Strategy Needs User Behavior Analytics
Christie Ott

Detection and Response
Rolling with Your Logs, Part 2: Advanced Mode Searches
Teresa Copple

Cloud and Devops Security
Automate Insight Agent Deployment in AWS
Ben Glass

Products and Tools
Metasploit Wrapup 11/9/18
Pearce Barry

Industry Trends
Top 5 Cybersecurity Threats Healthcare Organizations Face
Kristina LeBlanc

Detection and Response
Rolling with Your Logs, Part 1: Your Guide to Log Search in InsightIDR
Teresa Copple

Products and Tools
Announcing the 2018 Metasploit Community CTF
Caitlin Condon

Products and Tools
Metasploit Wrapup: 11/2/18
Aaron Soto

Industry Trends
Expanded Protections for Security Researchers Under DMCA Sec. 1201
Harley Geiger

Security Operations
Three Expensive Security Operations Costs and How to Minimize Them with SOAR
Christie Ott