Cloud security | 4 min read
Observing Atlas Lion (part two): Winning the battle, with an eye on the war

This is part two of our series on Atlas Lion, a threat group out of Morocco that targets organizations with fraudulent gift cards.

Cloud security | 4 min read
Observing Atlas Lion (part one): Why take control when you can enroll?

Cybercrime group Atlas Lion targets orgs using gift cards. Their attacks highlight the importance of secure enrollment processes for devices.

Cloud security | 3 min read
Comparison of cloud resources (part IV): Making a roadmap for cloud security

This is part four of our four-part blog series on comparing cloud resources. Part four covers the roadmap for cloud security.

Cloud security | 14 min read
Comparison of cloud resources (part III): Demystifying cloud security tools in the platform and application layer

This is part three of our four-part blog series on comparing cloud resources. Part three defines tools used in the platform and app layers.

Cloud security | 8 min read
Comparison of cloud resources (part II): Demystifying cloud security tools

This is part two of our four-part blog series on comparing cloud resources. Part two defines the types of tools used for cloud security.

Cloud security | 5 min read
Comparison of cloud resources (part I): Securing every layer of your cloud—from the control plane to apps

This is part one of our four-part blog series on comparing cloud resources. Part one covers the layers of the cloud infrastructure.

Cloud security | 9 min read
Vulnerability management for cloud environments

Vulnerability management in the cloud has its own unique challenges and strategies. Dive into the nuances and how Expel can help.

Cloud security | 8 min read
Cloud security: alert best practices (part II)

This is part two of a two-part blog on cloud security alerts, including what makes them unique and best practices for management.

Cloud security | 8 min read
Cloud security: alerts vs. on-prem alerts (part I)

This is part one of a two-part blog on cloud security alerts, including what makes them unique and best practices for management.

Cloud security | 6 min read
Part II: Fundamentals of Kubernetes security

Learn about the fundamentals of Kubernetes, including the four Cs of Kubernetes security and how Expel can help protect it.

Cloud security | 8 min read
Part I: Fundamentals of Kubernetes security

Learn about the fundamentals of Kubernetes, including its architecture, challenges, and false positives in part one of this two-part blog series.