5 min
SIEM
SIEM Market Evolution And The Future of SIEM Tools
There’s a lot to be learned by watching a market like SIEM adapt as technology evolves, both for the attackers and the analysis.
3 min
InsightIDR
InsightIDR Now Supports Multi-Factor Auth and Data Archiving
InsightIDR is now part of the Rapid7 platform. Learn more about our platform vision and how it enables you to have the SIEM solution you've always wanted.
2 min
InsightIDR
How to Detect BitTorrent Traffic on your Network
Learn how to detect BitTorrent traffic on your network to capture metadata such as INFO-HASH, IP addresses, and usernames.
1 min
InsightIDR
Want to Try InsightIDR in Your Environment? Free Trial Now Available
InsightIDR, our SIEM powered by user behavior analytics, is now available to try in your environment. This post shares how it can help your security team.
4 min
InsightIDR
PCI DSS Dashboards in InsightIDR: New Pre-Built Cards
No matter how much you mature your security program
[https://www.rapid7.com/fundamentals/security-program-basics/] and reduce the
risk of a breach, your life includes the need to report across the company, and
periodically, to auditors. We want to make that part as easy as possible.
We built InsightIDR [https://www.rapid7.com/products/insightidr/] as a SaaS SIEM
[https://www.rapid7.com/fundamentals/siem/] on top of our proven User Behavior
Analytics (UBA) [https://www.rapid7.com/solutions/user-
2 min
InsightVM
Wanna see WannaCry vulns in Splunk?
Do you want to see your WannaCry
[https://www.rapid7.com/security-response/wanna-decryptor/] vulns all in one
dashboard in Splunk? We've got you covered.
Before you start, make sure you have these two apps installed in your Splunk
App:
* Rapid7 Nexpose Technology Add-On for Splunk
[https://splunkbase.splunk.com/app/3457/]
* Rapid7 Nexpose for Splunk [https://splunkbase.splunk.com/app/3492/]
Steps
1. Follow the directions in this blog post
[https://www.rapid7.com/blog/post/2017/05/17/sc
5 min
Metasploit
The Shadow Brokers Leaked Exploits Explained
The Rapid7 team has been busy evaluating the threats posed by last Friday's
Shadow Broker exploit and tool release
[https://arstechnica.com/security/2017/04/purported-shadow-brokers-0days-were-in-fact-killed-by-mysterious-patch/]
and answering questions from colleagues, customers, and family members about the
release. We know that many people have questions about exactly what was
released, the threat it poses, and how to respond, so we have decided to compile
a list of frequently asked question
4 min
Penetration Testing
Combining Responder and PsExec for Internal Penetration Tests
By Emilie St-Pierre, TJ Byrom, and Eric Sun
Ask any pen tester what their top five penetration testing tools
[https://rapid7.com/fundamentals/penetration-testing-tools/] are for internal
engagements, and you will likely get a reply containing nmap, Metasploit,
CrackMapExec, SMBRelay and Responder.
An essential tool for any whitehat, Responder is a Python script that listens
for Link-Local Multicast Name Resolution (LLMNR), Netbios Name Service (NBT-NS)
and Multicast Domain Name System (mDNS)
4 min
InsightIDR
12 Days of HaXmas: Designing Information Security Applications Your Way
Merry HaXmas to you! Each year we mark the 12 Days of HaXmas
[https://www.rapid7.com/blog/tag/haxmas/] with 12 days of blog posts on
hacking-related topics and roundups from the year. This year, we're highlighting
some of the “gifts” we want to give back to the community. And while these gifts
may not come wrapped with a bow, we hope you enjoy them.
Are you a busy Information Security professional that prefers bloated web
applications, fancy interactions, unnecessary visuals, and overloaded scr
3 min
InsightIDR
How to Troubleshoot Slow Network Issues With Network Traffic Analysis
In this blog, we discuss how to troubleshoot slow network issues with Network Traffic Analysis.
6 min
User Behavior Analytics
User Behavior Analytics and Privacy: It's All About Respect
When I speak with prospects and customers about incident detection and response
(IDR) [https://www.rapid7.com/solutions/incident-detection/], I'm almost always
discussing the technical pros and cons. Companies look to Rapid7 to combine
user
behavior analytics (UBA)
[https://www.rapid7.com/solutions/user-behavior-analytics/] with endpoint
detection and log search to spot malicious behavior in their environment. It's
an effective approach: an analytics engine that triggers based on known attack
m
4 min
Cloud Infrastructure
Overcome Nephophobia - Don't be a Shadow IT Ostrich!
Overcome Nephophobia - Don't be a Shadow IT Ostrich!
Every cloud…..
When I was much younger and we only had three TV channels, I used to know a lot
of Names of Things. Lack of necessity and general old age has meant I've now
long since forgotten most of them (but thanks to Google, my second brain, I can
generally “remember” them! Dinosaurs, trees, wild flowers, and clouds were all
amongst the subject matters in which my five-year-old self was a bit of an
expert. I would point at the sky and wow
5 min
InsightIDR
New InsightIDR Detections Released
New detections have been introduced regularly since we first started developing
our Incident Detection and Response (IDR) solutions
[https://www.rapid7.com/solutions/incident-detection-and-response/] four years
ago. In fact, as of today, we have a collection of more than 50 of these running
across customer data. But what does that mean? And what are the very latest
detections to help your security program? Vendors have fancy names for what is
under the covers of their tools: “machine learning,”
3 min
Vulnerability Management
Warning: This Blog Post Contains Multiple Hoorays! #sorrynotsorry
Hooray for crystalware!
I hit a marketer's milestone on Thursday – my first official award ceremony,
courtesy of the folks at Computing Security Awards
[https://computingsecurityawards.co.uk/], which was held at The Cumberland Hotel
in London. Staying out late on a school night when there's a 16 month old
teething toddler in the house definitely took it's toll the following morning,
but the tiredness was definitely softened by the sweet knowledge that we'd left
the award ceremony brandishing so
3 min
InsightIDR
3 Ways for Generating Reports on WAN Bandwidth Utilization
3 popular ways of getting visibility into WAN bandwidth monitoring, one of the most popular use cases for network traffic analysis.