Kim Mahoney

Posts by Kim Mahoney

Threat intel | 4 min read
Beyond alert management: How threat intelligence actually helps your SOC

We're expanding our dedicated threat intel function to provide our customers with smarter, faster, threat intelligence they can use.

Product | 2 min read
Email coverage expansion: Sublime Security integration now live

Expel MDR for Email now integrates with Sublime Security for enhanced threat visibility across your inboxes.

MDR | 3 min read
Getting real value from your Palo Alto investment: how Expel MDR transforms security operations

Expel MDR reduces Palo Alto alert noise by 87% with 17-minute response times. Expert 24x7 analysis maximizes your security investment ROI.

Product | 3 min read
Unlocking more from your CrowdStrike investment

Expel cuts through the flood of CrowdStrike alerts by 91% on average to maximize your security tools with strong API connections.

MDR | 5 min read
Insights on the MDR market from the Gartner® Security & Risk Summit

Expel attending the Gartner Security & Risk Summit. Here are the insights we gathered on the MDR market post-conference.

MDR | 2 min read
Simplifying Microsoft security with Expel MDR

Expel MDR seamlessly integrates with all the Microsoft security tools in your tech stack, from Microsoft Azure to Microsoft 365 and more.

Product | 2 min read
Expel MDR customers benefit from expanded threat intel experience

Threat Bulletins are now available in Expel Workbench™, including details on any threat hunting completed to resolve the issue.

Company news | 3 min read
Expel again recognized in the Gartner Market Guide for Managed Detection and Response Services

The report provides an overview of the MDR services market for buyers considering service providers. Here’s a peek at some of the insights.

MDR | 3 min read
AI and security: hype or hope?

Now that the dust is settling and the AI picture is getting clearer, it's time to separate fact from fiction.

MDR | 2 min read
Risk-based prioritization is the key to your vulnerability management challenges

Instead of wasting resources on low-risk vulnerabilities, vulnerability prioritization identifies, prioritizes, and remediates based on relative risk.

MDR | 2 min read
Threat hunting complements MDR for a stronger defensive strategy

Learn how an elite MDR operation works with threat hunting to rapidly uncover critical insights and stop threats faster.

MDR | 2 min read
Vulnerability management, prioritization, and assessment: what’s the difference?

Prioritize vulnerabilities effectively. Learn how management covers the full lifecycle and why prioritization is key to reducing your risk.