3 min
Awards
Rapid7 Named a Leader in the 2020 Forrester Wave™ for Midsize Managed Security Services Providers, Q3 2020
Rapid7 is thrilled to be named a Leader in The Forrester Wave™: Midsize Managed Security Services Providers, Q3 2020!
7 min
Managed Detection and Response (MDR)
Rapid7 Managed Detection and Response: The Service that Never Sleeps
In this post, we break-down everything you need to know about Rapid7 Managed Detection and Response (MDR).
6 min
Managed Detection and Response (MDR)
Maturing Your Security Posture: Around-the-Clock Threat Detection With Managed Detection & Response (MDR) Services
Recently, we sat down with Jeremiah Dewey, Rapid7’s VP of Managed Services, to chat about how MDR services strengthen traditional security products.
6 min
Managed Detection and Response (MDR)
Managing Cybersecurity in the Real Estate Industry
We sat down with Tony Hamil, the senior cybersecurity engineer for a real estate development company, to hear how he and his team are managing security.
9 min
Security Operations (SOC)
Moving Toward a Better Signature Metric in SOCs: Detection Efficacy
In this blog, we break-down the "Detection Efficacy" metric within the Security Operation Center (SOC).
3 min
Detection and Response
5 Challenges Outsourced Detection and Response Operations Can Help Solve
In this blog, we discuss five challenges that managed detection and response (MDR) operations can help solve.
6 min
Managed Detection and Response (MDR)
Uncooking Eggs: Manual Dridex Dropper Malicious Document Deobfuscation Methods
Learn how to analyze an obfuscated malicious document with a focus on basic static analysis.
3 min
Managed Detection and Response (MDR)
How MDR SOC Customer Tony Hamil Leverages the Automation of InsightConnect
Recently, Tony Hamil spoke with us about how InsightConnect, Rapid7’s SOAR solution, enhances and goes beyond the capabilities of the MDR SOC.
4 min
InsightIDR
Rapid7 Named a Leader in Gartner Magic Quadrant for Security Information and Event Management (SIEM)
Rapid7 is thrilled to be recognized as a Leader in the 2020 Gartner Magic Quadrant for Security Information and Event Management (SIEM).
5 min
MSSP
Why Do Managed Detection and Response (MDR) Services Exist in a World Dominated by MSSPs?
In this blog, we break-down why Managed Detection and Response (MDR) services can survive in a market dominated by MSSP's.
5 min
Managed Detection and Response (MDR)
How Attackers Can Harvest Users’ Microsoft 365 Credentials with New Phishing Campaign
In this blog post, Rapid7's MDR services team outlines a unique phishing campaign that utilizes a novel method of scraping organizations’ branded Microsoft 365 tenant login pages to produce highly convincing credential harvesting pages.
4 min
Managed Detection and Response (MDR)
A Day in the Life of a Rapid7 SOC Analyst
Today, we are diving into a day in the life of a Rapid7 security operations center (SOC) analyst, specifically around threat detection and response.
6 min
Managed Detection and Response (MDR)
Managed Threat Detection and Response Vendors: Questions You Need to Ask
In this post, Wade Woolwine, managed services director of technology at Rapid7,
details our approach to managed detection and response: visibility, analytics,
and arming our analysts with smart, customizable automation.
Defending the modern enterprise is hard work. Between the need for
round-the-clock coverage, technology to provide full visibility across the
expanding enterprise, a highly skilled and experienced team, and the business
level pressure to “prevent a breach,” there is little wonde
4 min
Endpoint Security
Why Managed Detection and Response Zeroes In On the Endpoint
This post was co-written with Wade Woolwine
[https://www.rapid7.com/blog/author/wade-woolwine/], Rapid7 Director of Managed
Services.
What three categories do attackers exploit to get on your corporate network?
Vulnerabilities, misconfigurations, and credentials. Whether the attack starts
by stealing cloud service credentials, or exploiting a vulnerability on a
misconfigured, internet-facing asset, compromising an internal asset is a great
milestone for an intruder.
Once an endpoint is comprom
3 min
GDPR
MDR and GDPR: More than a lot of letters
With 2018 now well in our sights, the countdown to the General Data Protection
Regulation (GDPR). is most definitely on. Articles 33 and 34 of the GDPR
[https://www.rapid7.com/fundamentals/gdpr/] require organizations to communicate
personal data breaches when there is a high risk of impact to the people to whom
the data pertains. GDPR security requirements and breach notification go
hand-in-hand, for obvious reasons. In the words of the European Commission
Working Party 29 (the group who are ta