5 min
IT Ops
The Role of Log Files in Experiments
You have heard, no doubt, of theLean Startup
. If you need a refresher to place the name, it’s a book, but it’s also a
business trend with such momentum as to have awebsite advertising it as a
“movement.” And, frankly, that advertisement is
hardly a stretch. The title and the terms coined in it are on everyone’s lips
in the tech industry these days because people at companies of all s
3 min
InsightIDR
Launching InsightIDR: From compromise to containment, FAST.
We just launched InsightIDR, the only fully integrated detection and
investigation solution that lets you identify a compromise as it occurs and
complete an investigation before things get out of control. InsightIDR does
three things well: detect attacks with high fidelity, accelerate investigations,
and end the drudgery of security data management. I'd like to take a minute to
share how we got here and why we're so excited to show you InsightIDR.
Cutting through the Noise to Detect Attacks
5 min
IT Ops
TypeScript Language Primer
What is TypeScript?
TypeScript is an open source typed superset of JavaScript
which compiles to plain JavaScript.
Many people have considered JavaScript’s loose typing as a problem, but now
TypeScript offers a solution to that. Specifically, TypeScript allows you to
code with decorators/annotations, classes, interfaces, private properties and
typing compliance.
We also might say that TypeScript is ES6 with some extra options.
What does TypeScript do?
6 min
IoT
Smile! You're on Candid APT
Recently IP camera hacking has taken front stage in the news
. Actually, hacking IP cameras is not all that new—it's been around for a number
of years—but historically the focus has been related to gaining access to just
the video portion of the camera. But with IP cameras being one of the many IoT
technologies out there often found to be improperly secured, I figured it was
time to look
8 min
IT Ops
IOT made real - Using TI SensorTag data with Logentries and NodeRed
Learn how to send IoT Data from the TI CC 2650 SensorTag to Logentries (using
Node-Red).
This is the first of a series of IoT blogs that show you how easy it can be to
integrate a range of real sensor devices with Logentries and how to use the data
from those devices once it is in Logentries. This follows the earlier blog
showing why a centralised
logging service would be useful for IoT developers and users. This series of
blogs will show ju
2 min
IoT
CVE-2015-7547: Revenge of Glibc Resolvers
If you've been involved in patch frenzies for any reasonable amount of time, you
might remember last year's hullabaloo around GHOST
, a
vulnerability in glibc's gethostbyname() function. Well, another year, another
resolver bug.
gethostbyname(), meet getaddrinfo()
This time, it's an exploitable vulnerability in glibc's getaddrinfo(). Like
GHOST, this will affect loads and loads of Linux client and server applications,
and lik
5 min
IT Ops
Troubleshooting with Nexpose Logs
Nexpose is the industry
standard in Vulnerability Management, giving you the confidence you need to
understand your ever-changing attack surface, focus on what matters, and create
better security outcomes.
Table of contents
* Where are the Nexpose logs located?
* Setting up the Logentries Agent
* Analyzing the logs- mem.log
* nsc.log
* auth.log
* Get started
-------------------------------
2 min
IT Ops
Using Logs for Security & Compliance: Part 3
This 3-part series explores the critical role logs play in maintaining
regulatory compliances and provides specific examples of known events to look
for an how to evaluate different compliance tools.
--------------------------------------------------------------------------------
When it comes to PCI Compliance
, simply collecting and
storing your logs isn’t enough.
2 min
Public Policy
I've joined Rapid7!
Hello! My name is Harley Geiger and I joined Rapid7 as director of public
policy, based out of our Washington, DC-area office. I actually joined a little
more than a month ago, but there's been a lot going on! I'm excited to be a part
of a team dedicated to making our interconnected world a safer place.
Rapid7 has demonstrated a commitment to helping promote legal protections for
the security research community. I am a lawyer, not a technologist, and part of
the value I hope to add is as a repr
5 min
IT Ops
Considering the Explosive Growth of Log Analytics
You’d have to be living in a cave to not know that the practice of log analytics
in corporate IT has grown dramatically in the last 10 years. This explosion in
logging activities over the recent years is due to two factors, the maturing of
log technology and the expanded application of logging to new information
domains such as tracking user behavior, tracking page views, and tracking API
interaction, to name a few such activities.
As logging technology matures, the price goes down. Getting a
2 min
IT Ops
Using Logs for Security & Compliance: Part 2
This 3-part series explores the critical role logs play in maintaining
regulatory compliances and provides specific examples of known events to look
for an how to evaluate different compliance tools.
--------------------------------------------------------------------------------
For organizations looking to achieve and maintain PCI compliance, requirements
related to the secure retention of log data are common.
The se
3 min
Authentication
Simple Network Management Protocol (SNMP) Best Practices
By Deral Heiland, Research Lead, and Brian Tant, Senior Consultant, of Rapid7
Global Services
Over the past several years while conducting security research in the area of
Simple Network Management Protocol (SNMP) and presenting those findings at
conferences around the world we are constantly approached with the same
question: “What are the best practices for securing SNMP”?
The first thing to remember about SNMP versions 1, 2, and 2c is that the
community strings used for authentication are c
2 min
IT Ops
Using Logs for Security & Compliance: Part 1
This 3-part series explores the critical role logs play in maintaining
regulatory compliances and provides specific examples of known events to look
for an how to evaluate different compliance tools. To download the free 24-page
white paper, click here
.
--------------------------------------------------------------------------------
For organizations that need to remain compliant with specific regulatory
standards, requ
2 min
Windows
Nexpose Remote Registry Activation for Windows
The Windows Registry is a database which stores all settings for a Windows
system, e.g. hardware, software installed, Windows updates installed and
preferences for users and their applications. During normal day to day use a
standard user will inadvertently push changes into this database when they
update the system, add/remove applications and so on.
Remote Registry is a Windows service which allows a non-local user to read or
make changes to the registry on your Windows system when they are
1 min
Metasploit
Six Wonderful Years
Rapid7 has been my home for the last six years, growing from 98 people when I
joined to over 700 today. Keeping up with the growth has been both exhilarating
and terrifying. I am really proud of our Austin team, the Metasploit ecosystem,
and our leadership in security research. We care about our customers, our
employees, and our impact in the industry. Working at Rapid7 has simply been the
best job I have ever had.
We have surpassed every goal that I set when I joined in 2009. Metasploit is
thr