Back to Intelligence

Leveraging Rapid7's 'Hacktics and Telemetry' to Proactively Defend Against Emerging Threats

SA
Security Arsenal Team
March 28, 2026
4 min read

Leveraging Rapid7's 'Hacktics and Telemetry' to Proactively Defend Against Emerging Threats

Introduction

In the modern security operations center (SOC), information overload is a persistent adversary. A new technique surfaces in a research thread, a question about exposure arises in a chat channel, and suddenly your team is juggling risk assessments, patch management cycles, and identifying logging gaps—all while determining which tools fall within the blast radius.

This chaos is the daily reality for defenders building, shipping, and securing systems. To combat this noise and streamline the ingestion of actionable intelligence, Rapid7 Labs has launched "Hacktics and Telemetry," a new bi-weekly podcast designed specifically for the defensive community. For IT and security teams, this resource represents a focused opportunity to cut through the hype and access the technical details needed to protect the organization.

Technical Analysis

While "Hacktics and Telemetry" is a media product, its core function addresses a critical technical gap: the latency between vulnerability discovery and operational understanding.

The Scope of the Problem Defenders often face a disconnect between raw vulnerability data (CVEs) and the practical exploitation reality. When a new technique drops, understanding the "blast radius"—the specific assets, configurations, or logs affected—is often manual and time-consuming.

Host Expertise and Format The podcast is hosted by Douglas McKee of Rapid7, leveraging his deep technical and leadership background, and co-hosted by researcher Jonah ‘CryptoCat’ Burgess, who maintains a strong pulse on the cybersecurity community.

Each episode utilizes a consistent format designed for efficiency:

  1. The Scan: A breakdown of recent threats and research.
  2. Technical Deep Dive: Analysis of the mechanics behind new exploits or defensive techniques.
  3. Impact Analysis: Connecting research to real-world risk for enterprise environments.

By distilling complex research into digestible, lunch-break-length episodes, the podcast serves as a human-powered intelligence feed, helping teams prioritize which logging gaps to close and which patches require immediate attention.

Executive Takeaways

  • Operationalize Intelligence: Security leaders should encourage SOC and IT staff to use episodes like a "daily standup" supplement. The topics discussed can directly feed into internal ticketing systems for patch validation or log source tuning.
  • Reduce Alert Fatigue: By providing context on why a specific technique or vulnerability matters, the podcast helps analysts filter out noise and focus on high-fidelity detections relevant to their environment.
  • Community-Driven Defense: The collaboration between hosts with deep research backgrounds highlights the importance of community intelligence. Leveraging external research like Rapid7 Labs prevents teams from working in a silo.

Remediation

To derive maximum defensive value from "Hacktics and Telemetry" and improve your organization's security posture, take the following actionable steps:

  1. Integrate into Knowledge Management: Do not treat this as passive entertainment. Assign a team member to listen bi-weekly and extract specific IOCs (Indicators of Compromise), vulnerability references (CVEs), or logging requirements mentioned in the episodes.

  2. Audit Your Log Sources: Use the "logging gaps" mentioned in the podcast intro as a checklist. If an episode discusses a technique that requires specific EDR or network log data to detect, verify that your current SIEM or data lake is ingesting those specific events.

  3. Update Patch Prioritization: When the "scan" section highlights a new vulnerability, cross-reference it with your asset inventory. Move from a "patch everything" approach to a "patch what is exposed" strategy based on the technical context provided by the hosts.

  4. Team Discussion Points: Use the episode topics as a prompt for "Red vs. Blue" discussions. Ask your team: "If this technique was used against us, would our current telemetry catch it?"

Related Resources

Security Arsenal Alert Triage Automation AlertMonitor Platform Book a SOC Assessment platform Intel Hub

alert-fatiguetriagealertmonitorsocthreat-intelligencevulnerability-managementrapid7podcast

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.