Quick Cookie Notification

This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.


View Cookie Policy for full details

Rapid7 Blog

Rapid7  

AUTHOR STATS:

919

Rapid7 Threat Intelligence Book Club: ‘Countdown to Zero Day’ Recap

The final section of Kim Zetter's “Countdown to Zero Day”pulls together the many factors that are present in attacks such as Stuxnet.…

Summertime and the Coding Is (Sometimes) Easy: What I Learned During GSoC for Metasploit

My name is Eliott Teissonniere, and I was selected as a Google Summer of Code (GSoC) student for Metasploit this summer! Today, I am excited to tell you more about what we did and what’s next.…

CIS Critical Security Control 18: Breaking Down the Control Chaos of Application Software Security

Application software security (Critical Control 18) may seem overwhelming, but when upheld, it can make your SDLC wishes and SecOps dreams come true.…

How to Choose a Security Orchestration and Automation Platform

In the market for a security orchestration and automation platform but don’t know what solution is right for you? Or perhaps you’ve made some rushed decisions with past products and want to take a more careful approach this time around? We get it…

2017 Security Careers Highlights: Roles and Responsibilities in Demand

The demand for security professionals today is higher than it’s ever been before. It’s a hot field to be in, considering how fast technology is advancing, companies are digitizing, and threats are proliferating. 2017 paved the way for massive growth in the security…

How to Securely Handle a Lost or Stolen Device: A Practical Workflow

It’s 10pm and you receive an email from a teammate that their laptop was stolen at a local networking event. You learn that not only was their computer unlocked, but they were logged into their company email and Salesforce accounts at the time the…

Security Career Paths: Common and Unique Roles

Security is one of the most in-demand roles today. According to recent numbers, the demand for security workers is expected to grow to 6 million worldwide by 2019. So how do you get into or grow your career in security? What makes security so interesting…

NCSAM Security Crash Diet, Week 4: IoT

The final week of our 'Security Crash Diet' series for NCSAM explores what the IoT device purchasing process is like for consumers who want to buy IoT with security in mind. Spoiler: It isn't easy.…

Why Security Teams Should Embrace (Not Fear) Automation

It’s not the coming of the apocalypse. It’s not the end of the security profession. And it’s certainly not a bad thing. We’re talking about the rise of automation. As security threats become a bigger part of the day-to-day concerns at…

NCSAM Security Crash Diet, Week 3: Privacy and Backups

In week three of Rapid7's NCSAM 'Security Crash Diet' series, our cybersleuth 'Olivia' tests practical advice on privacy (think location-sharing) and has a few scary moments with backups.…

Everything You Need to Know About Building a Career in Security

Are you thinking about pursuing a career in security? Or have you already started one, and you’re wondering what it will take to get to the next level? Perhaps you have been in the security field for a long time, and it’s starting…

NCSAM Security Crash Diet, Week 2: Social and Travel

Rapid7 guinea pig 'Olivia' describes her efforts during week two of her security 'crash diet for National Cyber Security Awareness Month. This week focused on social sharing and travel security.…

NIST Standards and Why They Matter

A primer on implementing NIST recommendations by guest author Matt Kelly…

NCSAM Security Crash Diet, Week 1: Maintenance

One of Rapid7's employees tries a month of different 'security diets' in the spirit of National Cyber Security Awareness Month. Week one highlights the importance of maintenance.…

SOC Series: How to Choose the Right Skills for Your SOC

Do you have the right mix of skills in your security operations center (SOC)? Whether your SOC is brand new or has been around for years, you need to be sure it’s built to meet the demands of today’s complex security landscape. In…

Featured Research

National Exposure Index 2018

The National Exposure Index is an exploration of data derived from Project Sonar, Rapid7's security research project that gains insights into global exposure to common vulnerabilities through internet-wide surveys.

Learn More

Toolkit

Make Your SIEM Project a Success with Rapid7

In this toolkit, get access to Gartner's report “Overcoming Common Causes for SIEM Solution Deployment Failures,” which details why organizations are struggling to unify their data and find answers from it. Also get the Rapid7 companion guide with helpful recommendations on approaching your SIEM needs.

Download Now

Featured Research

Quarterly Threat Report

Rapid7’s Quarterly Threat Report leverages intelligence from our extensive network—including the Insight platform, managed detection and response engagements, Project Sonar, Heisenberg Cloud, and the Metasploit community—to put today’s shifting threat landscape into perspective. It gives you a clear picture of the threats that you face within your unique industry, and how those threats change throughout the year.

Learn More