Analyze Security Data Faster with Visual Search in InsightIDR
Learn how InsightIDR, Rapid7’s SIEM tool, uses visualization to provide powerful security data analysis.…
Top 3 Outcomes Organizations Try to Achieve in Their Incident Detection and Response Programs
In this blog, we break down the top three outcomes organizations try to achieve in their Detection and Response programs.…
The Importance of Network Visibility With a Remote Workforce
As IT and network security staff around the world hurry to roll out more and more VPN and remote access services, it’s important to recognize that security or operational issues can arise.…
3 Common Threats to Look for in Your Network Data
Today, we'll be highlighting three common threats to keep an eye out for in your network data and the best methods of remediation.…
Rapid7 Named a Leader in 2020 Gartner Magic Quadrant for Security Information and Event Management
Rapid7 is thrilled to be recognized as a Leader in the 2020 Gartner Magic Quadrant for Security Information and Event Management (SIEM).…
Intro to the SOC Visibility Triad
In this blog, we break-down the three pillars of the Security Operations Center (SOC) Visibility Triad.…
How to Analyze Your Log Data Using the Log Search API in InsightIDR
In this blog, we discuss how to analyze your log data using InsightIDR's Log Search API.…
Building a Daily Threat Simulation Tool with Todd Beebe
In our latest episode of Security Nation, we sat down to talk with Todd Beebe about the automated threat simulation system that he built for his current employer.…
Unlocking the Power of the InsightIDR Threat API, Part 2
In this post, we’ll demonstrate how to scrape a few sites for possible bad actors using InsightIDR.…
Be Audit You Can Be, Part 1: How to Securely Send and Monitor Your Audit Logs with InsightIDR
In this blog, we discuss how to collect the audit trail from a device or application using InsightVM and InsightIDR.…
Accelerating Incident Response with Threat Intelligence and Alert Enrichment
Rapid7 continues to invest in making automation more accessible for security professionals across the entire Insight Cloud product suite and our standalone SOAR solution, InsightConnect.…
Import External Threat Intelligence with the InsightIDR Threats API
In this blog, we explain how to automate updating threat feeds in InsightIDR using the REST API.…
The Fundamentals of Building a Threat Detection and Response Program
In this post, we’ll summarize some of the key takeaways for businesses looking to further their threat detection and response programs, as well as provide helpful resources that will help you along the way.…
How Attackers Can Harvest Users’ Microsoft 365 Credentials with New Phishing Campaign
In this blog post, Rapid7's MDR services team outlines a unique phishing campaign that utilizes a novel method of scraping organizations’ branded Microsoft 365 tenant login pages to produce highly convincing credential harvesting pages.…
Automating the Cloud: AWS Security Done Efficiently
Today, we are going to be installing software on all your existing EC2 instances across several (or all!) accounts under an organization in AWS.…