September 14, 2017November 22, 2023 Don’t dam upstream: ways to build a feedback loop Review four approaches to strengthen your security operations feedback loop and ensure analysts can influence detection. Part 2 of keep your security nerds happy series
April 26, 2024April 26, 2024 Expel notices Howdy! Welcome to Expel’s Privacy Center. At Expel, we believe security can’t exist without privacy. We believe transparency is at the heart of what we do and in the security services we…
April 15, 2024May 9, 2024 Expel Service Level Agreement This Service Level Agreement applies to the following Expel products: Expel Managed Detection and Response (MDR) Expel MDR for Cloud Control Plane Expel MDR for Cloud Workload Expel MDR for Endpoint and…
December 8, 2023January 22, 2024 Expel Named to Five 2023 Best Workplaces Lists by Great Place to Work® Herndon, VA, December 6, 2023 – Expel, the security operations provider that aims to make security easy to understand, use, and improve, today announced its placement on five Best Workplaces lists by…
December 8, 2023January 18, 2024 What makes Expel a Great Place to Work®? Great Place to Work has included Expel on several impressive Best Workplace lists. Maybe your future is here? Maybe you’re thinking about the next step in your professional future, contemplating a career…
November 15, 2023November 29, 2023 How we built it: the app that gives our analysts more time to fight cyber evil Our auto-close marketing emails (AME) feature frees up time for our analysts and was developed using machine learning. Here’s how we did it. Those of us in cybersecurity must understand and respond…
November 13, 2023November 13, 2023 Suspicious Outlook rules: high-fidelity patterns to watch for When it comes to hacker activities post-compromise, inbox rule manipulation can be an attacker’s Swiss Army knife. Check out what we’ve learned from analyzing a dataset of true positive Microsoft 365 Outlook…
October 6, 2023October 9, 2023 Oh Noes! Our IR tabletop game is new and improved! Back by popular demand: Oh Noes! role-playing game actually makes testing your incident response (IR) plan fun You asked us to refresh our popular IR role-playing game (RPG) and we heard you.…
September 27, 2023October 4, 2023 Proactive threat hunting: the what, why, and how Threat hunting comes in two flavors: proactive and reactive. There are important differences, and here we explain what they are. Some history on “threat hunting” The first well-documented mention of threat hunting…
September 12, 2023September 14, 2023 Two new Expel Workbench™ improvements for greater transparency Part of a strong security posture is having a full view of what’s going on across your tech environments. One of the great things about Expel Workbench™ is the visibility you get…
September 6, 2023September 6, 2023 New partner program grows businesses, brands, relationships Expel’s new partner emphasis drives tremendous value for collaborating partners and customers. If you’ve ever heard that “teamwork makes the dream work”—well, we agree. We can also agree that the best companies…
August 31, 2023September 6, 2023 AiTM/business email compromise attacks: what to watch for Adversary-in-the-middle attacks are effective at bypassing MFA and conditional access defenses. Here are some tips to help safeguard your organization. You may think multi-factor authentication (MFA) and conditional access will protect your…