Quick Cookie Notification

This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.


View Cookie Policy for full details

Rapid7 Blog

Automation and Orchestration  

Three Expensive Security Operations Costs and How to Minimize Them with SOAR

With the release of our Security Orchestration and Automation ROI Calculator, here are the three areas where companies spend the most resources on security.…

7 Funny and Punny Halloween Costume Ideas for Tech and Cybersecurity Pros

Stuck on what to be this year? Here are some of our favorite Halloween costume ideas for tech and cybersecurity professionals.…

Take a Bite out of the Vulnerability Remediation Backlog with InsightVM

Security teams dealing with expanding networks and increasingly sophisticated attacks can use InsightVM to help stay on top of their vulnerability backlog.…

Security Orchestration and Automation: Not Just for Mature Organizations

Think that security, orchestration, and automation (SOAR) is only for mature organizations? Think again. Here are some ways your company can benefit from SOAR solutions.…

Customer Panel Recap: Building a Modern Security Program

I recently had the chance to sit down with two Rapid7 customers to hear how they’ve approached building out their security programs and some of the obstacles they’ve encountered in the process.…

Automate to Accelerate: Introducing Security Orchestration and Automation on the Rapid7 Insight Platform

Rapid7 is proud to officially announce orchestration and automation on our Insight platform, with automation taking shape in a number of existing products and our new SOAR offering, Rapid7 InsightConnect.…

Accelerate Incident Response with Security Orchestration and Automation

Security orchestration and automation can be a saving grace in security for many resource-strapped or highly targeted companies.…

Building a Tech Stack to Enable Security Orchestration and Automation

In this blog post, we explore how to plan for security orchestration and automation while building out your technology stack. Learn more.…

How Security Automation Helps You Work Smarter and Improve Accuracy

Many of us, across many different industries, have to make decisions amidst a multitude of different input and alerts. Wherever possible, automating certain responsibilities can aid tremendously in reducing the manual workload, helping us cut down on human error and make better decisions. Take the…

Do You Need Coding Resources on Your Security Team?

Often when security teams think about security automation, they worry they don’t have the coding capabilities needed to create, implement, and maintain it. Pulling development resources from the IT team or engineering department can take time; backlogs are long, and revenue-generating projects tend to…

In Our Customers’ Words: Why Mastering Application Security Basics Matters

In a recent conversation with a Rapid7 application security customer, I was reminded how much of a security practitioner’s day can be consumed by troubleshooting buggy tools and manually executing the same tasks over and over again (needlessly, may I add). As much as…

Top Three Questions to ask Security Orchestration and Automation Vendors

If you’ve been in cybersecurity for some time, you’ve likely heard about the many benefits of security orchestration and automation: time saved, costs reduced, risk exposure mitigated ... the list goes on. And as this popular technology proliferates across our industry, you have more…

How Security Orchestration and Automation Will Unite Infosec

After working in the security industry for 15 years, one of the consistent themes I’ve observed is how teams struggle with balancing the increasing amount of work they have to do, without an increase in resources to accomplish their goals. But there’s another,…

Incorporating Automated Actions Into Your Vulnerability Management Process

In today’s security climate, we all want to know that our data is as current as possible. Often, customers will increase their vulnerability scanning frequency to weekly or even daily to meet the needs of an ever-changing environment. However, this requires a lot of…

2017 Security Careers Highlights: Roles and Responsibilities in Demand

The demand for security professionals today is higher than it’s ever been before. It’s a hot field to be in, considering how fast technology is advancing, companies are digitizing, and threats are proliferating. 2017 paved the way for massive growth in the security…