Rapid7 Threat Report

Using threat intelligence and data science to shed light on your unique threat landscape

The “threat landscape” is a moving, shifting form that will look different to different organizations—it all depends on where you are standing. Some people may be staring at a wide open grassland where the landscape is understood and the threats are easy to identify (though no less deadly), and others may be facing a dense jungle of hidden threats. While it's possible to develop a universal threat landscape that may be useful for general security research and developing high-level incident response frameworks, it is more useful for defenders to have a solid understanding of their own unique threat landscape.

The Rapid7 Quarterly Threat Report leverages intelligence from Rapid7’s extensive network—including the Rapid7 Insight platform, Rapid7 Managed Services, Rapid7 Incident Response engagements, Project Sonar, Heisenberg Cloud, and the Metasploit community—to put this shifting landscape into perspective. It gives you a clear picture of the threats that you face within your unique industry, and how those threats change throughout the year. 

Read the Reports:

Rapid7 Quarterly Threat Report, 2017 Q1

Rapid7 Quarterly Threat Report, 2017 Q2

Rapid7 Quarterly Threat Report, 2017 Q3


Read the press release
to learn more about Rapid7's dedication to collaboration and information sharing among the cybersecurity community. 

Learn from the Experts: Threat Intelligence and Incident Response

Threat Intelligence: And How It Informs a Security Program

Rebekah Brown, threat intelligence lead at Rapid7, discusses how threat intelligence fits into a larger security program.

Threat Intelligence: And How It Informs a Security ProgramManaged Detection and Response: Threat HuntingThreat Intelligence: Building a Threat Intel ProgramManaged Detection and Response: The Only MDR with UBA

Resource

How to Build Threat Intelligence into your Incident Detection and Response Strategy


In this on-demand webcast, learn how to leverage threat intelligence as a critical component in breach prevention, detection, and investigation.

View now

Podcast

The State of Threat Intelligence


Listen Now