Quick Cookie Notification

This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.

View Cookie Policy for full details

Rapid7 Blog




All Red Team, All the Time

In last week's blog (which you should read now if you have not), I said: The core problem with security today isn't about technology. It's about misaligned incentives. We are trying to push security onto people, teams, and processes that just don't want it. To…

Push vs Pull Security

I woke up from a dream this morning. Maybe you can help me figure out what it means.Your company hired me to build a security program. They had in mind a number of typical things. Build a secure software development lifecycle so app developers…

CISOs: Do you have enough locks on your doors?

In a previous blog post, I referenced some research on how people plan for, or rather how they fail to plan for, natural disasters like floods. At the end of the blog post I mentioned that people who have poor mental models about disasters fail…

Insiders and Outsiders in Security

“Those fools. They didn't even bother to do X. And everyone knows you have to do X.”If you've been in Infosec for even a short time, you've seen this sort of statement, whether explicit or implicit, about something in the news. It…

Culture of Security

I sometimes talk to executives about how employees and their fellow executives at the company view security, and about cultural issues around security. They often tell me that, generally speaking, people are on board with the necessary work to keep things safe. I've yet to…

The Absence of Evidence in Breaches

Try this experiment. Go to your favorite search engine and type this: ”no evidence” security compromise(Other variations are also interesting, including adding words like “breach”)There is something about the phrase “no evidence” that troubles me. You may…

CISO in Residence Series: Security teachable moments

A CISO I know was recently asked by his parent company to log into a third party web portal to receive some important business plans and legal documents. The web portal is designed to securely upload documents by one person or team, and to be…

CISO in Residence Series: Shocked But Not Surprised

I've been thinking about a number of topics about the state of the security industry. If you're reading this blog post you have been also. News of breaches is hard to avoid. In particular, I've been interested in learning more about what I see as…

Introducing the CISO in Residence

At the start of 2010 I started as Twitter's first security hire. You may recall a number of security challenges we were facing at that time. We had to build out a number of teams to deal with the entire spectrum of security issues. Today…

Featured Research

National Exposure Index 2018

The National Exposure Index is an exploration of data derived from Project Sonar, Rapid7's security research project that gains insights into global exposure to common vulnerabilities through internet-wide surveys.

Learn More


Make Your SIEM Project a Success with Rapid7

In this toolkit, get access to Gartner's report “Overcoming Common Causes for SIEM Solution Deployment Failures,” which details why organizations are struggling to unify their data and find answers from it. Also get the Rapid7 companion guide with helpful recommendations on approaching your SIEM needs.

Download Now

Featured Research

Quarterly Threat Report

Rapid7’s Quarterly Threat Report leverages intelligence from our extensive network—including the Insight platform, managed detection and response engagements, Project Sonar, Heisenberg Cloud, and the Metasploit community—to put today’s shifting threat landscape into perspective. It gives you a clear picture of the threats that you face within your unique industry, and how those threats change throughout the year.

Learn More