AI & automation
Current events | 4 min read
Expel’s predictions for 2025: our crystal ball says…Read what our Expel experts are predicting for AI and security in 2025. These predictions can help you continue planning for new year.
Data & research | 2 min read
From exhaustion to equilibrium: battling burnout in your SOCOur new ebook covers the burnout epidemic in the industry, and how you can address it.
Data & research | 3 min read
Expel Quarterly Threat Report Q2 2024 volume II: Attackers advance with AIVolume II of our Quarterly Threat Report covers how attackers are advancing with AI in Q2 of 2024. Learn what to focus on right now.
MDR | 3 min read
AI and security: hype or hope?Now that the dust is settling and the AI picture is getting clearer, it's time to separate fact from fiction.
MDR | 3 min read
How phishing threat actors are using AI: a real world exampleOur phishing team intercepted an email that appears to contain AI-generated code. Here's what it can teach you.
Engineering | 5 min read
How we built it: the app that gives our analysts more time to fight cyber evilAuto-close marketing emails (AME), a feature we built for our SOC, not only frees up time for our analysts, it offers insight into application development using machine learning.
Security operations | 7 min read
How we built it: Alert SimilarityOur Alert Similarity tool lets us teach our bots to compare similar “documents” and suggest or recommend a next step, freeing up our analysts. Here’s a walk-through of how we developed it.
Security operations | 4 min read
How Expel’s Alert Similarity feature helps our customersWe process millions of alerts each day, and many look similar to one another. We asked ourselves: is it possible to teach our bots to compare similar “documents” and suggest or recommend a next step? (Spoiler alert: YES!)
Tips | 6 min read
Prioritizing suspicious PowerShell activity with machine learningAttackers love to look to PowerShell to enact their evil plans. Expel’s senior data scientist tells us how she used machine learning to help analysts spot malicious activity in PowerShell quickly.