Security operations
Expel Quarterly Threat Report Q3: Top 5 takeaways

Our third quarterly (Q3) threat report is here and it’s overflowing with cybersecurity data, trends, and recommendations to help you protect your organization. Here are our top five takeaways from Q3.

Security operations | 2 min read
2023 Great eXpeltations report: top six findings

Our second annual Great eXpeltations report details the major trends our security operations center (SOC) team saw in customer environments last year. It also offers insights and advice to help you avoid these threats.

Security operations | 1 min read
Understanding the 3 Classes of Kubernetes Risk

The first step toward securing Kubernetes environments is understanding the risks they pose and identifying the ways in which those risks can be mitigated.

Security operations | 2 min read
Tell Dr. Kubernetes where it hurts

Kubernetes is growing rapidly, and for important reasons. Like many new technologies, though, it faces growing pains. In part 1 of a series, Dan Whalen outlines the most common Kubernetes challenges.

Tips | 7 min read
So you’ve got a multi-cloud strategy; here’s how to navigate four five common security challenges

Switching to a multi-cloud solution? Easy! Just kidding. Expel’s senior detection & response engineer shares some things you need to think about when going multi-cloud – and how to stay sane.

Tips | 2 min read
BEC and a “Visionary” scam

The lessons we learn in “real life” apply to the cyber world, and vice versa. You should take your sensitivity to the iffy product and service claims you encounter with you every day when you log in.

Security operations | 5 min read
Incident report: stolen AWS access keys

Here we walk through what happens when attackers steal a set of AWS access keys. Recently, our SOC, threat hunting, and detection engineering teams collaborated on such an incident.

Security operations | 3 min read
Emerging Threat: CircleCI Security Incident

Expel is aware of CircleCI’s reported security incident and recommendation to rotate all credentials. Here’s what happened, why it matters, what we’re doing, and what you should do.

Engineering | 1 min read
So long, 2022! Our year in review

To mark the end of 2022 and the beginning of 2023, we’ve curated some of our favorite blog posts from the past 12 months.

Tips | 5 min read
The Security Clause

Believe it or not, there are some parallels between Scott Calvin figuring out his new gig as Santa in the 1994 film, The Santa Clause, and a person entering a new cybersecurity role. Here are a few.

Expel insider | 3 min read
5 cybersecurity predictions for 2023

It’s that time of year when security folks gaze into the future and predict what’s on the horizon for 2023. Here’s what we think is up next for the cybersecurity industry in the new year.

Security operations | 4 min read
Dr. Strangelog or: How I learned to stop worrying and love alert

What if your data were higher in fidelity and context? We afford more refined alerts and embed more context and stability, assuming the tech is advanced enough to generate rich security signal.

Engineering | 5 min read
45 minutes to one minute: how we shrunk image deployment time

We recently figured out how to reduce Kubernetes image deployment time from 45 minutes (way too long) to one minute (really fast). Here’s how we did it.