SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Rapid7 AI risk intelligence innovations

30 Oct 2025

Rapid7 AI risk intelligence innovations
Contact company
Contact Rapid7
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Rapid7 announces AI-generated risk intelligence to expedite vulnerability remediation and reduce security risks.
  • New Remediation Hub capabilities provide actionable insights for prioritising vulnerability mitigation and communication.
  • Vulnerability intelligence in Intelligence Hub offers adversary-aware prioritisation of exploited CVEs for security teams.
Related Links
  • Rapid7's AI-powered threat detection solution
  • Rapid7 2025 Access Brokers Report: Cyber threat insights

Rapid7, Inc. has unveiled AI-generated risk intelligence integrations within its Rapid7 Command Platform, enhancing its Remediation Hub's functionality.

This new capability aims to expedite remediation efforts by providing security teams with a clear, contextual view of vulnerabilities. By transforming vulnerability data into actionable insights, teams can prioritise actions, improving internal communication and collaboration for tangible risk reduction.

Enhanced vulnerability intelligence capabilities

Additionally, Rapid7 has introduced new features in its Intelligence Hub, an integrated threat intelligence solution that offers security teams relevant context and actionable insights for faster detection and response.

This initiative addresses the widening gap between detection and action, as 22% of enterprise security decision-makers highlight the lack of a comprehensive remediation prioritisation strategy as a significant challenge, according to Forrester.

Focus on AI-generated risk summaries

Craig Adams emphasised the importance of context in prioritising security measures

The latest innovations focus on AI-generated risk and vulnerability intelligence to assist organisations in prioritising their remediations effectively.

Craig Adams, Chief Product Officer at Rapid7, emphasised the importance of context in prioritising security measures. By delivering insights on exploitability and asset criticality, these innovations aim to enhance shared understanding and expedite the mean time to remediate (MTTR).

AI-driven context in risk summaries

The new AI-driven risk summaries offer a comprehensive view of affected systems, detailing real-world activities around each risk and suggesting appropriate actions, such as patching or applying controls. Rapid7’s ability to incorporate AI-driven context into these reports promises quicker decision-making and improved coordination between security and IT teams.

The summaries integrate exploit signals, asset criticality, and diverse sources of vulnerability data into concise, easily understandable briefs. Each summary provides prioritisation based on exploitation likelihood and business impact, ticket-ready context, and fact-based urgency, using data from CISA KEV, EPSS, and threat intelligence sources, along with estimates for patch coverage and implementation obstacles.

Advancements in Intelligence Hub

Rapid7's vulnerability intellect abilities, integrated into Intelligence Hub, give curated, realistic threat contexts

Rapid7's vulnerability intelligence capabilities, integrated into Intelligence Hub, deliver curated, realistic threat contexts for exploited CVEs.

This enhancement enables security teams to focus on relevant vulnerabilities, streamlining remediation based on specific organisational risk rather than relying on generic ratings.

Curated CVE profiles

The Intelligence Hub leverages curated CVE profiles, supported by Rapid7 Labs' research, AttackerKB assessments, and public data, facilitating actionable prioritisation and mitigation of exploited CVEs. Insights from these profiles will also feature in the Remediation Hub, enriching the context available for vulnerability prioritisation.

AI-generated risk summaries within the Rapid7 Command Platform and Intelligence Hub's vulnerability intelligence capabilities will begin rolling out to customers in late November.

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Show full press release

Rapid7, Inc., a pioneer in threat detection and exposure management, announced AI-generated risk intelligence as part of the Rapid7 Command Platform. Delivered through Remediation Hub, the new capability accelerates remediation by giving security teams a clear, contextual, and actionable view of each exposure, transforming vulnerability data into risk intelligence-informed decisions that help teams to prioritise remediation, and communicate and collaborate with internal teams to drive measurable risk reduction.

In addition, Rapid7 added new vulnerability intelligence capabilities to Intelligence Hub, the company’s integrated threat intelligence solution designed to provide security teams with meaningful context and actionable insights for accelerated detection and response.

Rapid7’s latest innovations

The gap between detection and action continues to widen. According to Forrester, “lack of comprehensive vulnerability and exposure remediation prioritisation strategy is among the biggest IT/security challenges for 22% of enterprise security decision-makers’ organisations.”

As threat actors exploit vulnerabilities within days and security teams face mounting pressure to show measurable risk reduction, organisations need faster, more intelligent ways to decide what to fix first. Rapid7’s latest innovations directly address this need, empowering teams to cut through noise, focus on impact, and remediate exposures with precision and confidence.

Latest innovations around AI-generated risk

“Exposures are growing faster than teams can respond,” said Craig Adams, chief product officer at Rapid7. “Organisations rely on their security partners to give them the context they need to prioritise."

"Our latest innovations around AI-generated risk and vulnerability intelligence provide important insights into exploitability, asset criticality, and potential risk. The result: shared context, fewer debates, and faster mean time to remediate (MTTR).”

AI-generated risk summaries in Remediation Hub

With these new risk summaries, organisations can immediately see which systems are affected, the real-world activity surrounding each risk, and recommend next steps – from patching to applying compensating controls.

By embedding AI-driven context directly into these summaries, Rapid7 enables faster decision-making and stronger alignment between security and IT teams.

Within seconds, Rapid7’s AI-generated summaries fuse exploit signals, asset criticality, and vulnerability data from multiple sources into a concise, plain-language brief that enables teams to quickly prioritise risks.

Each summary provides:

  • Prioritisation clarity based on exploitation likelihood and business impact
  • IT-ready context for tickets and change windows
  • Fact-based urgency using CISA KEV, EPSS, and threat intelligence data
  • Effort estimates for patch coverage and blockers

Vulnerability intelligence in Intelligence Hub

With its latest vulnerability intelligence capabilities, Intelligence Hub delivers curated, real-world threat context to exploited CVEs, allowing security teams to effectively prioritise remediation efforts based on their organisation’s specific risk.

Rapid7's vulnerability intelligence, available within Intelligence Hub, cuts through the noise and alert storms to identify and surface the vulnerabilities that actually matter, rather than leaving security teams to rely on generic security ratings to decipher what is a true risk for their organisation.

Vulnerability intelligence capabilities

Curated CVE profiles, powered by a combination of Rapid7 Labs vulnerability and threat research, real-world vulnerability assessments from AttackerKB, and public metadata, enable actionable, adversary-aware prioritisation and mitigation of exploited CVEs for security teams.

These insights will also be integrated into Remediation Hub, providing customers with threat actor context to support their vulnerability prioritisation process.

AI-generated risk summaries will begin rolling out to Exposure Command and Surface Command customers in late November within the Rapid7 Command Platform. Vulnerability intelligence capabilities within Intelligence Hub will also begin rolling out in November.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Cyber security
  • Artificial intelligence (AI)
  • Related categories
  • Power supplies & batteries
  • Bollards
  • Video servers (IP transmission)
  • Barricades
  • Storage
  • Barriers
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Corporate news
About this page

Discover Rapid7's AI-generated risk intelligence innovations, accelerating remediation and improving vulnerability management with actionable insights, enhancing security teams' prioritisation and collaboration for measurable risk reduction. Explore seamless integration with Rapid7 Command Platform.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec