Incident Response Services
Penetration Testing Services
IoT Security Services
Training & Certification
Managed Vulnerability Management
Managed Application Security
Managed Detection & Response
Find a Partner
Rapid7 Insight is your home for SecOps, equipping you with the visibility, analytics, and automation you need to unite your teams and amplify efficiency.
Insight Cloud Overview Try Now
User Behavior Analytics & SIEM
Orchestration & Automation
Need a hand with your security program? From planning and strategy to full service support, our experts have you covered.
Need immediate help with a breach?
The “threat landscape” is a moving, shifting form that will look different to different organizations—it all depends on where you are standing. Some people may be staring at a wide open grassland where the landscape is understood and the threats are easy to identify (though no less deadly), and others may be facing a dense jungle of hidden threats. While it's possible to develop a universal threat landscape that may be useful for general security research and developing high-level incident response frameworks, it is more useful for defenders to have a solid understanding of their own unique threat landscape.
The Rapid7 Quarterly Threat Report leverages intelligence from Rapid7’s extensive network—including the Rapid7 Insight platform, Rapid7 Managed Services, Rapid7 Incident Response engagements, Project Sonar, Heisenberg Cloud, and the Metasploit community—to put this shifting landscape into perspective. It gives you a clear picture of the threats that you face within your unique industry, and how those threats change throughout the year.
2018: Q1, Q2, Q3
2017: Q1, Q2, Q3, Q4 and 2017 Wrap-Up
Read the press release to learn more about Rapid7's dedication to collaboration and information sharing among the cybersecurity community.
Rebekah Brown, threat intelligence lead at Rapid7, discusses how threat intelligence fits into a larger security program.
In this on-demand webcast, learn how to leverage threat intelligence as a critical component in breach prevention, detection, and investigation.