Cloud security | 2 min read
Cloud Decoded (part 3): Hey CISOs, stop guessing when it comes to cloud security

Part three of our Cloud Decoded blog series focuses on what you need to know about cloud detection and response (CDR).

Cloud security | 3 min read
Cloud Decoded (part 2): What attackers don’t want you to know

This is part two of Expel's blog series on decoding the cloud. It dives in to what attackers don't want you to know.

Cloud security | 4 min read
Cloud Decoded (part 1): The cloud security mythbuster—what MDR really means for cloud

This is part one of Expel's blog series on decoding the cloud. The first one covers what MDR really means for cloud.

Cloud security | 3 min read
Comparison of cloud resources (part IV): Making a roadmap for cloud security

This is part four of our four-part blog series on comparing cloud resources. Part four covers the roadmap for cloud security.

Cloud security | 14 min read
Comparison of cloud resources (part III): Demystifying cloud security tools in the platform and application layer

This is part three of our four-part blog series on comparing cloud resources. Part three defines tools used in the platform and app layers.

Cloud security | 8 min read
Comparison of cloud resources (part II): Demystifying cloud security tools

This is part two of our four-part blog series on comparing cloud resources. Part two defines the types of tools used for cloud security.

Cloud security | 5 min read
Comparison of cloud resources (part I): Securing every layer of your cloud—from the control plane to apps

This is part one of our four-part blog series on comparing cloud resources. Part one covers the layers of the cloud infrastructure.

Cloud security | 9 min read
Vulnerability management for cloud environments

Vulnerability management in the cloud has its own unique challenges and strategies. Dive into the nuances and how Expel can help.

Cloud security | 8 min read
Cloud security: alert best practices (part II)

This is part two of a two-part blog on cloud security alerts, including what makes them unique and best practices for management.

Cloud security | 8 min read
Cloud security: alerts vs. on-prem alerts (part I)

This is part one of a two-part blog on cloud security alerts, including what makes them unique and best practices for management.

Cloud security | 6 min read
Part II: Fundamentals of Kubernetes security

Learn about the fundamentals of Kubernetes, including the four Cs of Kubernetes security and how Expel can help protect it.

Cloud security | 8 min read
Part I: Fundamentals of Kubernetes security

Learn about the fundamentals of Kubernetes, including its architecture, challenges, and false positives in part one of this two-part blog series.

Cloud security | 3 min read
New mind maps & cheat sheets: Azure & Kubernetes

Our new Kubernetes mind map/cheat sheet show you which API calls are associated with different MITRE ATT&CK tactics in K8 environments.

Cloud security | 3 min read
Cloud repatriation and cybersecurity challenges

Many factors influence the decision to move data back on prem. Organizations must plan for security both during and after the move.

Cloud security | 3 min read
Staff, C-suite disagree on how security drives innovation

This 2023 CSA research report found that the C-suite and security staff are disconnected on the role security plays in innovation.

Cloud security | 3 min read
In the age of innovation, does security hold the key?

A new report by the CSA showcases the results of research on getting a deeper understanding of areas of innovation and cloud use trends.

Cloud security | 3 min read
Kubernetes security: what to look for

Building a Kubernetes security platform? Learn what to look for and get key suggestions for your future security strategy and tools.

Cloud security | 3 min read
Why MDR for Kubernetes environments is great news for your org

This post discusses how managed detection and response (MDR) for Kubernetes environments helps organizations relying on in-house application development.

Cloud security | 1 min read
Understanding the 3 Classes of Kubernetes Risk

The first step toward securing Kubernetes environments is understanding the risks they pose and identifying the ways in which those risks can be mitigated.

Cloud security | 2 min read
Tell Dr. Kubernetes where it hurts

Kubernetes is growing fast, but so are its challenges. Get part 1 of our series, where we outline the most common hurdles you'll face.

Cloud security | 4 min read
Dr. Strangelog or: How I learned to stop worrying and love alerts

Higher-fidelity data leads to better security alerts. Our advanced tech embeds more context and stability to provide more refined security signals.

Cloud security | 5 min read
Understanding role-based access control in Kubernetes

Understanding authorization is critical to securing Kubernetes. Learn how RBAC works and the rules that govern your access control.

Cloud security | 3 min read
Three Kubernetes events worth investigating

Monitoring your Kubernetes environment? Learn what to look for and how to use audit logs to secure your production workloads.

Cloud security | 3 min read
Kubernetes: the whale in the room

More than half of our cloud customers use Kubernetes (k8s) to ship software faster and cut costs with elastic infrastructure.

Cloud security | 2 min read
A defender’s MITRE ATT&CK cheat sheet for Google Cloud

Get a head start on security. Our new guide maps GCP incident patterns to the MITRE ATT&CK Framework to help protect your organization.

Cloud security | 3 min read
Incident report: Spotting an attacker in GCP

Our guide details a GCP breach, from the attacker's access to our investigation. Learn our key takeaways for securing your cloud environment.