Articles By: Rapid7

Under the Hoodie 2020 Report

While we may play into the hacker hoodie stereotype, our pen testers and researchers are the core of what Rapid7 stands for. They shine a light on attacker behavior, help us build better tools, and connect with the community. Rapid7’s Under the Hoodie report is an annual, statistical study of the art of penetration testing. This year, we collected data […]

Read more ›

Rapid7 Research Uncovers Key Vulnerabilities and Credential Issues in Tech Industry

With tech companies particularly susceptible to both internal and external threats, an annual penetration test can help these organizations discover their key security gaps and plan for next steps to properly shore up their security. But what kinds of things do pen testers commonly find during these engagements? What does the tech industry need to do better? Read more.

Read more ›

Securing Virtual Workforces

Many security teams are still struggling to adjust to a virtual workforce and the new requirements that came along with that. We have heard from many companies that they are struggling with remote vulnerability scanning, business continuity plans, and a whole host of other challenges. In this guide we have compiled our recommendations on the things you should be paying […]

Read more ›

Ransomware Playbook

Ransomware is a unique security threat where most of the security team’s effort is spent on prevention and response because once ransomware is detected, it’s too late. However, there are many actions you can take to lower the risk and impact of this kind of attack. Here’s how Rapid7 can help.

Read more ›

Security Orchestration and Automation (SOAR) Playbook

Security orchestration and automation helps teams improve their security posture and create efficiency—without sacrificing control of important security and IT processes. This playbook highlights some of the most common use cases for security orchestration and automation, as well as useful tips on how to get started.

Read more ›

4 Steps to Prove the Value of Your Vulnerability Management Program

Learn how to focus your efforts, prove the value of your program, and gain trust, budget, and recognition in 4 doable steps.

Read more ›

Driving Immediate Value With a Cloud SIEM

Detection and response is a critical piece in an ongoing journey to improve your security posture. As the threat landscape grows increasingly complex, an effective detection and response program will help you recognize threats early and minimize the likelihood of attacker success. For many SIEM vendors, solving these complex problems requires a complex solution. For us, there’s a better way.

Read more ›

Nicer 2020 Report

Rapid7’s National / Industry / Cloud Exposure Report (NICER) for 2020 is the most comprehensive census of the modern internet. In a time of global pandemic and recession, the Rapid7 research team offers this data-backed analysis of the changing internet risk landscape, measuring the prevalence and geographic distribution of commonly known exposures in the interconnected technologies that shape our world.

Read more ›