Blog

State Police Department Reduces Remote Attack Surface With Expanse

Problem A large state police department faced challenges in identifying and securing attack vectors across its remote attack surface. The department had unintentionally exposed more than 75 Remote Desktop Protocol (RDP) servers, the majority of which corresponded to state police cruiser vehicles, that could have left the department open to attack by malicious actors online. Continue reading…

Risky Assets and Traffic Still Prevalent in Leading Healthcare Orgs

Internet Data Bytes: Healthcare Welcome to Expanse’s new blog series, Internet Data Bytes! This series will examine trends and cybersecurity risks Expanse regularly uncovers through our unique observations of Internet-accessible systems and services belonging to the world’s largest and most complex organizations. For this edition, we’re taking a quick dive into what a typical week Continue reading…

SIEM vs. SOAR: What’s the Difference?

SIEM and SOAR products exist to solve many of the same problems that security teams face today: to collect, normalize, aggregate, correlate, detect, alert on, and remediate across an ever-increasing number of disparate information vectors in order to manage security events in their networks. While these two classes of tools do have some similarities, they Continue reading…

Expanse Debuts New Integration for Splunk Phantom

Expanse is pleased to announce the release of our new integration for Splunk Phantom. As a Security Orchestration, Automation, and Response (SOAR) solution, Phantom plays a critical role in many of our customers’ ecosystems, helping them improve security teams’ efficiency and reduce incident response times.  Many of our customers in the Splunk universe are already Continue reading…

The 5 Most Strategic Ways to Protect Your Organization

And How to Take the Fight to the Adversary The world has changed dramatically over the last three months. As we all hunker down, one thing we can do is take the time to reset our thinking as it pertains to security, and make sure we are set up for success going forward.  Here’s my Continue reading…

Why Accenture Chose Expanse

Problem With globally dispersed teams and a constantly evolving network due to acquisitions, it was challenging for Accenture to get complete visibility into its Internet assets and services. Solution Accenture uses Expanse Expander to improve Internet asset discovery and inventory management, as well as to boost visibility into its cloud footprint and shadow infrastructure. This Continue reading…

My Journey From the FBI to Expanse

Armed with a gun, badge, and the latest and greatest technical advancements, I’ve spent my career tracking down and stopping threat actors on the streets and behind their computer screens. It’s been an epic journey from the FBI all the way to Expanse.   Chapter 1: In the Beginning I started my career in cybersecurity as Continue reading…