Follow Rapid7 on their other social channels!
About Us
Company Size:
1001-5000 employees
Company Type:
Boston, MA (HQ) / Global
Rapid7 (NASDAQ:RPD) powers the practice of SecOps by delivering shared visibility, analytics, and automation that unites security, IT, and DevOps teams. The Rapid7 Insight platform empowers these teams to jointly manage and reduce risk, detect and contain attackers, and analyze and optimize operatio ...
Read more
Promoted Content
30-Day Trial: UBA-Powered SIEM with Rapid7's InsightIDR
Free Buyer's Guide: Vulnerability Assessment
Finding and fixing vulnerabilities before attackers can take advantage of them is a proactive defensive measure essential to any security program. Core to this process is a vulnerability assessment (VA) tool, which discovers and scans assets, endpoints, and containers connected to your local, virtual, and cloud environments. This guide is designed to help you evaluate the many solutions and vendors on the market based on their ability to address the challenges that come with modern infrastructur ...
User and Asset Containment in InsightIDR
In this demo, Spencer Engleson, security solutions engineer, runs through a common phishing maldoc attack scenario to show how InsightIDR enables you to detect and contain threats. His exercise includes:·        Using a Metasploit instance to compromise a Windows 7 machine·        A malicious Word doc with embedded macros·        Privilege escalation on the compromised asset ...
The Forrester Wave™: Emerging Managed Security Services Providers (MSSPs), Q3 2018
In their Q3 2018 Wave for emerging Managed Security Services Providers (MSSPs), Forrester writes, "With a focus on technical knowledge, Rapid7’s analysts work closely with their clients’ preexisting technology investments to improve security maturity across the organization"; the evaluation gave Rapid7 the highest score among Strong Performers in the Current Offering axis. We believe this indicates Rapid7 managed services—staffed by a team of experts armed with industry-leading tools and m ...
Security Information and Event Management (SIEM) Buyer's Guide
Practical advice for choosing your first (or next) SIEM Security information and event management (SIEM) solutions have been around for the better part of two decades, but today's SIEMs don’t quite resemble their original, log management counterparts. Whether your organization is currently SIEM-less, or you’re exasperated and exhausted by your current SIEM, trying to negotiate the security products market to find the right SIEM solution for your organization can turn into a full-time job. Th ...
How to Set Up Your Security Operations Center (SOC) for Success
Considering adding 24/7 SOC coverage to your incident detection and response programs? Experiencing challenges with operating your existing SOC? Building or selecting the right provider for a 24/7 incident detection and response (IDR) operation can be a daunting task. You want to make sure you’re getting the most from your investment—and that your analysts have the visibility, technology, and structure they need to perform. Whether you’re looking to add coverage or are experiencing challe ...
This One Time on a Pen Test, Part 3: How Jumping a Fence and Donning a Disguise Helped Me Steal an Energy Company
Each year, Rapid7 penetration testers complete hundreds of internally and externally based penetration testing service engagements. This post is the third in a five-part series featuring testimonials of what goes on beneath the hoodie. For more insights, check out our report, “Under the Hoodie 2018: Lessons from a Season of Penetration Testing.”I was once part of a Red Team of three tasked with testing an energy company with three locations in three different cities. My assigned locatio ...
How to Identify and Prioritize Gaps with the Cybersecurity Maturity Assessment, Post-2018 'Under the Hoodie'
At Rapid7, we believe that cybersecurity within a company is not just a function with many stakeholders, but rather a shared responsibility among all employees, regardless of role. We have performed hundreds of cybersecurity maturity assessments (CSMAs) for our customers over the years, and one of the main things we continuously find is that the security team is often tasked with things that would be better assigned to IT and business leadership. Those responsibilities include everythi ...
Automation: The Ultimate Enabler for the Modern Security Team
As organizational networks increase in size and complexity and attackers become more advanced, the modern security team must evolve. Security needs to extend beyond the dedicated team and the silos across different business units need to be broken. The easiest and most efficient way to get to this state is by embracing security orchestration and automation (SOAR). When security automation and SIEM work together, organizations can improve their security operations and remediate threats quicker. ...
Faster Prod at the Expense of Security? 2018 ‘Under the Hoodie’ Reveals Gaps in Applications
Consumers have become accustomed to the online “try before you buy” experience. Whether it’s uploading a selfie to see if those “not sold in stores” eyeglasses look good on them, accessing virtual home-for-sale tours, or entering an email address to assess technology through a free trial, users have a greater ability than ever to whittle down their options without directly engaging a vendor.Vendors know this is an incredibly empowering experience for the user. So in their zeal to drive ...
This One Time on a Pen Test, Part 2: How Just One Flaw Helped Us Beat the Unbeatable Network
Each year, Rapid7 penetration testers complete hundreds of internally and externally based penetration testing service engagements. This post is the second in a five-part series featuring testimonials of what goes on beneath the hoodie. For more insights, check out our report, “Under the Hoodie 2018: Lessons from a Season of Penetration Testing.”Download the "Under the Hoodie" research report to understand the most prominent ways our pen testers were able to breach networks.Get StartedD ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?