2 min
Research
Rapid7 Releases Q2 2020 Quarterly Threat Report
It’s hard to believe it’s already the end of September, and with it comes Rapid7’s Q2 2020 Quarterly Threat Report.
6 min
Vulnerability Management
4 Common Goals For Vulnerability Risk Management Programs
This post will give you a glimpse into the research to pinpoint under-served and unmet customer needs in the vulnerability risk management space.
4 min
InsightConnect
Why Our Future in InfoSec Depends on Automation
In this blog, we discuss why our future in Information Security depends on automation.
5 min
Security Operations
How to Define Business Value for Security Programs
Today, we're evaluating the categorization of Detection and Response program outcomes and Attack Surface Management outcomes uncovered by Rapid7's UX team.
7 min
InsightIDR
10 Threat Detection and Response Resolutions for 2020
From knowing what you have, who may want it, and how they can get it: these 10 IDR resolutions for 2020 are sure to keep you busy.
5 min
Security Operations (SOC)
How to Develop a Common Language for Security Buy-In Across Your Business
In this blog, we break-down what keeps organizations from advancing their security programs, and how businesses can establish security priorities.
4 min
InsightIDR
How to Set Up Your Security Operations Center (SOC) for Success
Whether you’re looking to add coverage or are experiencing challenges with your existing security operations center (SOC), it's important to consider these factors before making a decision.
6 min
Managed Detection and Response (MDR)
Managed Threat Detection and Response Vendors: Questions You Need to Ask
In this post, Wade Woolwine, managed services director of technology at Rapid7,
details our approach to managed detection and response: visibility, analytics,
and arming our analysts with smart, customizable automation.
Defending the modern enterprise is hard work. Between the need for
round-the-clock coverage, technology to provide full visibility across the
expanding enterprise, a highly skilled and experienced team, and the business
level pressure to “prevent a breach,” there is little wonde