5 min
SIEM
SIEM Market Evolution And The Future of SIEM Tools
There’s a lot to be learned by watching a market like SIEM adapt as technology evolves, both for the attackers and the analysis.
3 min
InsightIDR
InsightIDR Now Supports Multi-Factor Auth and Data Archiving
InsightIDR is now part of the Rapid7 platform. Learn more about our platform vision and how it enables you to have the SIEM solution you've always wanted.
2 min
InsightIDR
How to Detect BitTorrent Traffic on your Network
Learn how to detect BitTorrent traffic on your network to capture metadata such as INFO-HASH, IP addresses, and usernames.
2 min
Incident Detection
Rapid7 and NISC work together to help customers with detection and response
Rapid7 and NISC will work together to provide Managed Detection and Response (MDR) services to the NISC member base, powered by the Rapid7 Insight platform and Rapid7 Security Operation Centers (SOCs.)
2 min
InsightIDR
Want to try InsightIDR in Your Environment? Free Trial Now Available
InsightIDR, our SIEM powered by user behavior analytics, is now available to try in your environment. This post shares how it can help your security team.
4 min
InsightIDR
PCI DSS Dashboards in InsightIDR: New Pre-Built Cards
No matter how much you mature your security program
[https://www.rapid7.com/fundamentals/security-program-basics/] and reduce the
risk of a breach, your life includes the need to report across the company, and
periodically, to auditors. We want to make that part as easy as possible.
We built InsightIDR [https://www.rapid7.com/products/insightidr/] as a SaaS SIEM
[https://www.rapid7.com/solutions/siem/] on top of our proven User Behavior
Analytics (UBA) [https://www.rapid7.com/solutions/user-beh
2 min
InsightIDR
More Answers, Less Query Language: Bringing Visual Search to InsightIDR
Sitting down with your data lake and asking it questions has never been easy. In
the infosec world, there are additional layers of complexity. Users are bouncing
between assets, services, and geographical locations, with each monitoring silo
producing its own log files and slivers of the complete picture.
From a human perspective, distilling this data requires two unique skillsets:
* Incident Response [https://www.rapid7.com/fundamentals/incident-response/]:
Is this anomalous activity a fa
3 min
Authentication
Under the Hoodie: Actionable Research from Penetration Testing Engagements
Today, we're excited to release Rapid7's latest research paper, Under the
Hoodie: Actionable Research from Penetration Testing Engagements
[https://www.rapid7.com/info/under-the-hoodie], by Bob Rudis
[https://twitter.com/hrbrmstr], Andrew Whitaker
[https://www.linkedin.com/in/drewwhitaker/], Tod Beardsley
[https://twitter.com/todb], with loads of input and help from the entire Rapid7
pentesting team.
This paper covers the often occult art of penetration testing, and seeks to
demystify the proce
8 min
SIEM
Incident Detection and Investigation - How Math Helps But Is Not Enough
I love math. I am even going to own up to having been a "mathlete" and looking
forward to the annual UVM Math Contest
[http://www.emba.uvm.edu/~lkost/UVM_Contest/uvm_contest.html] in high school. I
pursued a degree in engineering, so I can now more accurately say that I love
applied mathematics, which have a much different goal than pure mathematics.
Taking advanced developments in pure mathematics and applying them to various
industries in a meaningful manner often takes years or decades. In th
4 min
User Experience
12 Days of HaXmas: Designing Information Security Applications Your Way
Merry HaXmas to you! Each year we mark the 12 Days of HaXmas [/tag/haxmas/] with
12 days of blog posts on hacking-related topics and roundups from the year. This
year, we're highlighting some of the “gifts” we want to give back to the
community. And while these gifts may not come wrapped with a bow, we hope you
enjoy them.
Are you a busy Information Security professional that prefers bloated web
applications, fancy interactions, unnecessary visuals, and overloaded screens
that are difficult to
5 min
SIEM
12 Days of HaXmas: Rudolph the Machine Learning Reindeer
Merry HaXmas to you! Each year we mark the 12 Days of HaXmas [/tag/haxmas/] with
12 blog posts on hacking-related topics and roundups from the year. This year,
we're highlighting some of the “gifts” we want to give back to the community.
And while these gifts may not come wrapped with a bow, we hope you enjoy them.
Sam the snowman taught me everything I know about reindeer [disclaimer: not
actually true], so it only seemed logical that we bring him back to explain the
journey of machine learni
4 min
User Behavior Analytics
SIEM Tools Aren't Dead, They're Just Shedding Some Extra Pounds
Security Information and Event Management (SIEM) is security's Schrödinger's
cat. While half of today's organizations have purchased SIEM tools
[https://rapid7.com/fundamentals/siem-tools/], it's unknown if the tech is
useful to the security team… or if its heart is even beating or deployed. In
response to this pain, people, mostly marketers, love to shout that SIEM is
dead, and analysts are proposing new frameworks with SIEM 2.0/3.0, Security
Analytics
[https://www.forrester.com/report/Vendor+L
4 min
Incident Detection
Web Shells 101: Detection and Prevention
2016 has been a big year for information security, as we've seen attacks by both
cybercriminals and state actors increase in size and public awareness, and the
Internet of Things comes into its own as a field of study. But today we'd like
to talk about a very old (but no less dangerous) type of attacker tool – web
shells – and new techniques Rapid7 is developing for identifying them quickly
and accurately.
What is a Web Shell?
Web shells are web-based applications that provide a threat actor wi
3 min
InsightIDR
How to Troubleshoot Slow Network Issues With Network Traffic Analysis
In this blog, we discuss how to troubleshoot slow network issues with Network Traffic Analysis.
4 min
Incident Detection
Introspective Intelligence: What Makes Your Network Tick, What Makes It Sick?
In my last blog post
[/2016/11/16/introspective-intelligence-understanding-detections], we reviewed
the most prevalent detection strategies and how we can best implement them. This
post dives into understanding how to catch what our other systems missed, using
attacker behavior analytics and anomaly detection to improve detection.
Understand Your Adversary – Attack Methodology Detection
Contextual intelligence feeds introduce higher fidelity and the details needed
to gain insight into patterns