Posts tagged Detection and Response

3 min SIEM

Rapid7 Named a 2020 Gartner Peer Insights Customers’ Choice for Security Information Event Management

Rapid7 is excited to announce that we have been recognized as a Gartner Peer Insights Customers’ Choice for Security Information Event Management (SIEM).

5 min Detection and Response

How Rapid7 Customers Are Using Network Traffic Analysis in Detection and Response

In this blog, we discuss how Rapid7 Customers Are Using Network Traffic Analysis in Detection and Response

4 min SIEM

SIEM Security Tools: Six Expensive Misconceptions

Understanding recent improvements to traditional SIEMs incorporated by next-generation solutions proves critical to building a confident security posture.

9 min Security Operations (SOC)

Moving Toward a Better Signature Metric in SOCs: Detection Efficacy

In this blog, we break-down the "Detection Efficacy" metric within the Security Operation Center (SOC).

3 min Detection and Response

5 Challenges Outsourced Detection and Response Operations Can Help Solve

In this blog, we discuss five challenges that managed detection and response (MDR) operations can help solve.

3 min InsightIDR

How InsightIDR Is Accelerating Detection and Response in Modern Environments

According to The Total Economic Impact™ Of Rapid7 InsightIDR, customers experience increased visibility, decreased incident response time, and significant cost savings after switching to InsightIDR from their previous SIEM.

6 min Managed Detection and Response (MDR)

Uncooking Eggs: Manual Dridex Dropper Malicious Document Deobfuscation Methods

Learn how to analyze an obfuscated malicious document with a focus on basic static analysis.

3 min SIEM

Analyze Security Data Faster with Visual Search in InsightIDR

Learn how InsightIDR, Rapid7’s SIEM tool, uses visualization to provide powerful security data analysis.

4 min InsightIDR

3 Common Threats to Look for in Your Network Data

Today, we'll be highlighting three common threats to keep an eye out for in your network data and the best methods of remediation.

3 min Security Operations (SOC)

Intro to the SOC Visibility Triad

In this blog, we break-down the three pillars of the Security Operations Center (SOC) Visibility Triad.

8 min InsightIDR

How to Analyze Your Log Data Using the Log Search API in InsightIDR

In this blog, we discuss how to analyze your log data using InsightIDR's Log Search API.

3 min Detection and Response

InsightIDR: 2019 Year in Review

As we turn the corner into the new year, our team has been looking back at 2019 and reflecting on some of our most exciting updates from InsightIDR.

7 min InsightIDR

10 Threat Detection and Response Resolutions for 2020

From knowing what you have, who may want it, and how they can get it: these 10 IDR resolutions for 2020 are sure to keep you busy.

6 min

We Don’t Want White Font: Office Macros, Evasion, and Malicious Self-Reference

We identified the use of a document that leverages malformed headers, white fonts, and embedded VBA macros that execute the document’s contents via WScript.

4 min InsightIDR

Be Audit You Can Be, Part 2: How to Parse Out Fields in Your Logs

In this blog, we take a look at how InsightIDR’s Custom Data Parsing tool can make quick work of parsing out those interesting fields in the logs.