The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Metasploit Wrapup 11/16/18

Products and Tools

Metasploit Wrapup 11/16/18

Matthew Kienow's avatar

Matthew Kienow

5 Tips For Monitoring Network Traffic on Your Network

Products and Tools

5 Tips For Monitoring Network Traffic on Your Network

Rapid7's avatar

Rapid7

[Q&A] Why Every Threat Detection Strategy Needs User Behavior Analytics

Detection and Response

[Q&A] Why Every Threat Detection Strategy Needs User Behavior Analytics

Christie Ott's avatar

Christie Ott

Rolling with Your Logs, Part 2: Advanced Mode Searches

Detection and Response

Rolling with Your Logs, Part 2: Advanced Mode Searches

Teresa Copple's avatar

Teresa Copple

Automate Insight Agent Deployment in AWS

Cloud and Devops Security

Automate Insight Agent Deployment in AWS

Ben Glass's avatar

Ben Glass

Metasploit Wrapup 11/9/18

Products and Tools

Metasploit Wrapup 11/9/18

Pearce Barry's avatar

Pearce Barry

Top 5 Cybersecurity Threats Healthcare Organizations Face

Industry Trends

Top 5 Cybersecurity Threats Healthcare Organizations Face

Kristina LeBlanc's avatar

Kristina LeBlanc

Rolling with Your Logs, Part 1: Your Guide to Log Search in InsightIDR

Detection and Response

Rolling with Your Logs, Part 1: Your Guide to Log Search in InsightIDR

Teresa Copple's avatar

Teresa Copple

Announcing the 2018 Metasploit Community CTF

Products and Tools

Announcing the 2018 Metasploit Community CTF

Caitlin Condon's avatar

Caitlin Condon

Metasploit Wrapup: 11/2/18

Products and Tools

Metasploit Wrapup: 11/2/18

Aaron Soto's avatar

Aaron Soto

Expanded Protections for Security Researchers Under DMCA Sec. 1201

Industry Trends

Expanded Protections for Security Researchers Under DMCA Sec. 1201

Harley Geiger's avatar

Harley Geiger

Three Expensive Security Operations Costs and How to Minimize Them with SOAR

Security Operations

Three Expensive Security Operations Costs and How to Minimize Them with SOAR

Christie Ott's avatar

Christie Ott

Prioritizing the Fundamentals of Coordinated Vulnerability Disclosure

Vulnerabilities and Exploits

Prioritizing the Fundamentals of Coordinated Vulnerability Disclosure

Harley Geiger's avatar

Harley Geiger

A Day in the Life of a Rapid7 SOC Analyst

Security Operations

A Day in the Life of a Rapid7 SOC Analyst

Jonathan Beggs's avatar

Jonathan Beggs

Whiteboard Wednesday: Common Vulnerabilities as Personified by Halloween Costumes

Exposure Management

Whiteboard Wednesday: Common Vulnerabilities as Personified by Halloween Costumes

Bri Hand's avatar

Bri Hand

Shoring Up the Defenses Together: 2018Q2 and Q3 Wrap-Up

Vulnerabilities and Exploits

Shoring Up the Defenses Together: 2018Q2 and Q3 Wrap-Up

Sam Huckins's avatar

Sam Huckins

Metasploit Wrapup: 10/26/18

Exposure Management

Metasploit Wrapup: 10/26/18

Brent Cook's avatar

Brent Cook

Hacking as a Service: How This New Offering Is Changing the Threat Landscape

Exposure Management

Hacking as a Service: How This New Offering Is Changing the Threat Landscape

Kyle Montibello's avatar

Kyle Montibello

Rapid7 Leads All 'Strong Performers' in 2018 Forrester Wave for Emerging MSSPs

Products and Tools

Rapid7 Leads All 'Strong Performers' in 2018 Forrester Wave for Emerging MSSPs

Jake Godgart's avatar

Jake Godgart

Quantifying Vulnerability Risk: How to Quickly Calculate and Prioritize Risk

Exposure Management

Quantifying Vulnerability Risk: How to Quickly Calculate and Prioritize Risk

Nadean Tanner's avatar

Nadean Tanner

7 Funny and Punny Halloween Costume Ideas for Tech and Cybersecurity Pros

Exposure Management

7 Funny and Punny Halloween Costume Ideas for Tech and Cybersecurity Pros

Bri Hand's avatar

Bri Hand