Security operations | 4 min readThe clock is ticking: SEC reporting rules hit in December
The new SEC rules for reporting on material cybersecurity incidents go into effect in December. Learn how Expel can help you navigate this process, if your org is affected.
Security operations | 2 min readExpel Workbench History = unparalleled MDR transparency
Managed security services can often feel like a black box. Workbench's History shows every investigative action in a single thread, from the moment it was triaged through its closure.
Security operations | 9 min readBeware QR code phishing & other Grinchy scams this holiday season
As the holidays approach, cyber Grinches are targeting phishing campaigns to steal data, credentials and more. Look out for these email scams while online shopping and checking your inbox this season.
Security operations | 3 min readWhen does an org need to up its cybersecurity game?
How do orgs know when or how to up their security game? Every company reaches an inflection point as it grows, and it must have an acceptable level of security to earn customer and partner trust.
Engineering | 5 min readHow we built it: the app that gives our analysts more time to fight cyber evil
Auto-close marketing emails (AME), a feature we built for our SOC, not only frees up time for our analysts, it offers insight into application development using machine learning.
Engineering | 3 min readSuspicious Outlook rules: high-fidelity patterns to watch for
Inbox rule manipulation is hard to accurately alert on since inbox rule creation and management exist for valid reasons. Here’s some tips on how to spot high-fidelity inbox manipulation tactics.
Security operations | 3 min readOkta cross-tenant impersonation: a new Expel detection
Okta recently described a novel attack on a customer organization. Expel analyzed the information and has developed two new detections for this attack.
Security operations | 2 min readRisk-based prioritization in vulnerability management
Software vulnerabilities are a huge challenge, but risk-based, stakeholder-specific vulnerability prioritization can reduce organizational risk and drive better results. Read the white paper now.
Security operations | 3 min readFollowing the lifecycle of a cloud alert in Expel Workbench
Our new tour shows you the journey a cloud alert takes in Expel MDR for Cloud Infrastructure. It might just change how you think about securing your cloud (or multi-cloud) environment.