ebooks & Whitepapers
The ROI of “right-sized” logging: Getting value from your SIEM

Learn how to take detection engineering and log optimization from cost center to detection powerhouse with this ebook from Expel.

Videos
Is your identity security strategy broken? | Very Important Questions

Identity-based attacks are rising—and MFA alone isn’t enough. Former CISO Jason Rebholz explains what identity security actually requires.

Videos
Iran cyber threats: What security teams need to know right now | Expel briefing

What security teams need to know about Iran cyber threats. Expert insights on Iranian capabilities, TTPs, and defensive measures to implement today.

Tools
MDR vendor evaluation checklist

Compare MDR vendors side-by-side and spot gaps with ease with our free MDR vendor evaluation checklist–the perfect tool for narrowing down your shortlist.

Podcasts
Episode 7: Red Team Village: Break stuff, make friends | The Job Security Podcast

Red Team Village brings offensive security training to DEF CON and beyond. Explore workshops, tactics, and how AI tools augment red teamers.

Reports
Expel’s 2026 Annual Threat Report

Expel’s latest threat intelligence report takes real-life cybersecurity lessons learned and transforms them into actionable insights for security operators.

Case studies
Detection over compliance: building security that stops attacks

How Inductive Automation built detection-first security that proved itself in under 10 minutes—without adding headcount

Podcasts
Episode 6: Getting started in tech evangelism | The Job Security Podcast

Learn what tech evangelism really means in cybersecurity. Learn how to break into the field, build relationships, and add value.

Videos
An insider’s look at the NIS2 directive and DORA | Very Important Questions

Expel Field CISO Pierre Noel discusses NIS2 directive and DORA compliance—covering reporting deadlines, tabletops, and regulatory challenges.

Podcasts
Episode 5: Mental health in cybersecurity | The Job Security Podcast

Explore mental health in cybersecurity with Amanda Berlin of Mental Health Hackers. Learn practical strategies to combat burnout.

Reports
The CISO-CFO disconnect: why security and finance struggle on cyber investment

300 security and finance leaders reveal where alignment breaks down—and what actually fixes it

Videos
Reigning in cloud identity security: Expert insights | Nerdy 30, Episode 5

Dive deep into the complexities of cloud identity management and how to reign in the "identity chaos" defining modern cloud environments.