Security operations
Expel rides a Wave

Forrester recently invited Expel and a number of other cybersecurity companies to participate in research for its report, The Forrester Wave™: Managed Detection and Response, Q2 2023, and we jumped at the…

Security operations | 2 min read
Security alert: Okta “support user” data theft

Okta recently determined that an attacker stole support system user in an incident identified in October. Here’s what Okta customers need to know and do right now.

Security operations | 4 min read
The clock is ticking: SEC reporting rules hit in December

The new SEC rules for reporting on material cybersecurity incidents go into effect in December. Learn how Expel can help you navigate this process, if your org is affected.

Security operations | 2 min read
Expel Workbench History = unparalleled MDR transparency

Managed security services can often feel like a black box. Workbench's History shows every investigative action in a single thread, from the moment it was triaged through its closure.

Security operations | 9 min read
Beware QR code phishing & other Grinchy scams this holiday season

As the holidays approach, cyber Grinches are targeting phishing campaigns to steal data, credentials and more. Look out for these email scams while online shopping and checking your inbox this season.

Security operations | 3 min read
When does an org need to up its cybersecurity game?

How do orgs know when or how to up their security game? Every company reaches an inflection point as it grows, and it must have an acceptable level of security to earn customer and partner trust.

Security operations | 2 min read
To build or to buy…that is the question

One of life’s great questions: should I build my own SOC or partner with an MDR provider? There’s a lot more that goes into the answer than dollars and cents alone.

Engineering | 5 min read
How we built it: the app that gives our analysts more time to fight cyber evil

Auto-close marketing emails (AME), a feature we built for our SOC, not only frees up time for our analysts, it offers insight into application development using machine learning.

Engineering | 3 min read
Suspicious Outlook rules: high-fidelity patterns to watch for

Inbox rule manipulation is hard to accurately alert on since inbox rule creation and management exist for valid reasons. Here’s some tips on how to spot high-fidelity inbox manipulation tactics.

Security operations | 3 min read
Cloud repatriation and cybersecurity challenges

Many factors influence the decision to move data and workflows back on-premises. Organizations conducting these migrations must plan for security both during and after the move.

Security operations | 3 min read
Okta cross-tenant impersonation: a new Expel detection

Okta recently described a novel attack on a customer organization. Expel analyzed the information and has developed two new detections for this attack.

Security operations | 2 min read
Risk-based prioritization in vulnerability management

Software vulnerabilities are a huge challenge, but risk-based, stakeholder-specific vulnerability prioritization can reduce organizational risk and drive better results. Read the white paper now.

Security operations | 3 min read
Following the lifecycle of a cloud alert in Expel Workbench

Our new tour shows you the journey a cloud alert takes in Expel MDR for Cloud Infrastructure. It might just change how you think about securing your cloud (or multi-cloud) environment.