Posts tagged Detection and Response

9 min Security Operations (SOC)

Moving Toward a Better Signature Metric in SOCs: Detection Efficacy

In this blog, we break-down the "Detection Efficacy" metric within the Security Operation Center (SOC).

3 min Detection and Response

5 Challenges Outsourced Detection and Response Operations Can Help Solve

In this blog, we discuss five challenges that managed detection and response (MDR) operations can help solve.

3 min InsightIDR

How InsightIDR Is Accelerating Detection and Response in Modern Environments

According to The Total Economic Impact™ Of Rapid7 InsightIDR, customers experience increased visibility, decreased incident response time, and significant cost savings after switching to InsightIDR from their previous SIEM.

6 min Managed Detection and Response (MDR)

Uncooking Eggs: Manual Dridex Dropper Malicious Document Deobfuscation Methods

Learn how to analyze an obfuscated malicious document with a focus on basic static analysis.

3 min SIEM

Analyze Security Data Faster with Visual Search in InsightIDR

Learn how InsightIDR, Rapid7’s SIEM tool, uses visualization to provide powerful security data analysis.

4 min InsightIDR

3 Common Threats to Look for in Your Network Data

Today, we'll be highlighting three common threats to keep an eye out for in your network data and the best methods of remediation.

3 min Security Operations (SOC)

Intro to the SOC Visibility Triad

In this blog, we break-down the three pillars of the Security Operations Center (SOC) Visibility Triad.

8 min InsightIDR

How to Analyze Your Log Data Using the Log Search API in InsightIDR

In this blog, we discuss how to analyze your log data using InsightIDR's Log Search API.

3 min Detection and Response

InsightIDR: 2019 Year in Review

As we turn the corner into the new year, our team has been looking back at 2019 and reflecting on some of our most exciting updates from InsightIDR.

7 min InsightIDR

10 Threat Detection and Response Resolutions for 2020

From knowing what you have, who may want it, and how they can get it: these 10 IDR resolutions for 2020 are sure to keep you busy.

6 min

We Don’t Want White Font: Office Macros, Evasion, and Malicious Self-Reference

We identified the use of a document that leverages malformed headers, white fonts, and embedded VBA macros that execute the document’s contents via WScript.

4 min InsightIDR

Be Audit You Can Be, Part 2: How to Parse Out Fields in Your Logs

In this blog, we take a look at how InsightIDR’s Custom Data Parsing tool can make quick work of parsing out those interesting fields in the logs.

10 min Detection and Response

Unlocking the Power of the InsightIDR Threat API, Part 2

In this post, we’ll demonstrate how to scrape a few sites for possible bad actors using InsightIDR.

7 min InsightIDR

Be Audit You Can Be, Part 1: How to Securely Send and Monitor Your Audit Logs with InsightIDR

In this blog, we discuss how to collect the audit trail from a device or application using InsightVM and InsightIDR.

13 min InsightIDR

Import External Threat Intelligence with the InsightIDR Threats API

In this blog, we explain how to automate updating threat feeds in InsightIDR using the REST API.