Quick Cookie Notification

This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.

View Cookie Policy for full details

Rapid7 Blog

Bill Bradley  



How do You USB?

All the perimeter protection in the world won't stop an attack that doesn't get checked by the security measures around your perimeter, assuming the perimeter is still a viable term in today's distributed, mobile, and virtual world.  If an attacker were to drop a…

The report of my death was an exaggeration - Windows XP and Mark Twain

Microsoft formally announced the EOL of XP as of April 8, 2014.  This fact made a splash in the IT/InfoSec community but was quickly buried by the onslaught of Heartbleed traffic that same week.  Now that some of the Heartbleed buzz has…

Rapid7 for SANS Top 20 Compliance

Greetings post-move to our new home here in Boston, after having outgrown our previous space due to some phenomenal expansion, Rapid7is now a new citizen of the Financial District.  The new space is great, and I'm sure the orange paint suppliers of the world…

The next 40% attacked? The US Federal Government.

As a follow on to the blog about the data theft of 40% of South Korean credit cards, what is the next 40% number?  Per this article on this report nearly 40% of breaches of the US federal government go undetected.  If these…

Attacker theory vs attacker practical? Webinar - Thursday February 6 2:00 PM EST

The Advanced Persistent Threat (APT) model presents a neatly packaged and sanitized version of how an attacker may target, breach, collect information, then move on to their next victim.  There are some lessons in the model and it presents common steps as part of…

40% of the COUNTRY hacked!

With the US retail market reeling from a tough end to the holiday season due to security breaches a little news from overseas shows this problem has no borders and is continuing to grow.  Headlines are designed to be the hook to the article…

ControlsInsight...Controls discussed.

Rapid7 ControlsInsight allows organizations to quickly assess the deployment and configuration of 11 critical security controls from one platform; we'd like to take a brief look at these controls to discuss what they are and what they mean to the organization (Or as one of…

Happy 2014 ControlsInsight followers - Join us for the Rapid7 Roadshow

Happy 2014 to all Rapid7 ControlsInsight followers!We here at Rapid7 hope you had some time off over the holidays and are recharged and ready for a great 2014!  Today's topic is a plug for the upcoming Rapid7 Roadshow “Security at the Crossroads&…

Featured Research

National Exposure Index 2018

The National Exposure Index is an exploration of data derived from Project Sonar, Rapid7's security research project that gains insights into global exposure to common vulnerabilities through internet-wide surveys.

Learn More


Make Your SIEM Project a Success with Rapid7

In this toolkit, get access to Gartner's report “Overcoming Common Causes for SIEM Solution Deployment Failures,” which details why organizations are struggling to unify their data and find answers from it. Also get the Rapid7 companion guide with helpful recommendations on approaching your SIEM needs.

Download Now

Featured Research

Quarterly Threat Report

Rapid7’s Quarterly Threat Report leverages intelligence from our extensive network—including the Insight platform, managed detection and response engagements, Project Sonar, Heisenberg Cloud, and the Metasploit community—to put today’s shifting threat landscape into perspective. It gives you a clear picture of the threats that you face within your unique industry, and how those threats change throughout the year.

Learn More