Blog

Announcing the Launch of Expanse Link

At Expanse, we’re passionate about empowering the world’s largest companies and government organizations to innovate safely and leverage the power of the Internet without fear. Once, the Internet was seen as a playground where innovators could explore and share information safely and without limits. But today, the majority of attacks start via external vectors, making Internet Assets and Services a constant source of cyber risk. Expanse solves this challenge by providing leading organizations with a system of record for all of their Internet assets and an understanding of the risks posed by any assets that are exposed.

Meet the New Expander Technical Add-On for Splunk

Matt Kraning

At Expanse, we’re constantly looking to improve the experience of our customers by innovating on our core products, Expander and Behavior, and by providing integrations with other leading security and IT platforms. To deliver on this commitment, we’re excited to announce we’ve rolled out a new version of the Expander Technical Add-On (TA) for Splunk. Continue reading…

A Tale of Three Expanse Customers

The Internet is a small place. Attackers can scan the Internet in under an hour and get a list of every RDP, database, and abandoned web server out there. Because attackers can find exposed assets quickly, it’s important for organizations to reduce their attack surface so there are fewer opportunities for unauthorized entry. At Expanse, Continue reading…

3 Must-See Sessions at Black Hat 2019

It’s that time of the year again: Black Hat 2019 is almost here. As always, it should be a great event with top-of-the-line keynotes, fascinating sessions, amazing options from the vendor community (Expanse included), and of course an opportunity to mingle with friends and colleagues in the security industry.   With nearly 19,000 attendees and hundreds of Continue reading…

US Federal Agency Boosts Security

Problem A key US federal government agency had information siloed between the agency’s headquarters, security operations center, and various field locations. This made it challenging to enforce security and IT policies across a decentralized network and led to numerous unknown, unmanaged and vulnerable Internet-connected assets.  Solution The agency worked with Expanse to define its global Continue reading…

How to Implement Policies to Secure Your Network

Certain security basics used to be good enough to protect your network. You could roll out an endpoint security tool, implement a firewall, and use sandboxing, and at least sleep a little easier at night. But today’s attackers are more sophisticated, and that means security professionals have to be more sophisticated, too.  A key part Continue reading…

Fortune 100 Financial Services Company Reduces Attack Surface

Like most large financial institutions, this Fortune 100 financial services company has a complex network. From M&A activity to cloud development to securing critical suppliers, it was challenging for the company to identify and monitor all of its Internet-connected assets. And without a complete and accurate IT asset inventory, it was even more challenging to secure those assets.

What Keeps Security Leaders Up At Night

It’s easy to focus on the threats that you know about, and easy to ignore the ones that you don’t see. When organizations conduct vulnerability scans, they get a weekly reminder of all of the unpatched and out-of-date devices on their network. Spam and phishing emails come in daily and are a constant reminder of Continue reading…

5 Reasons You Need a Global View of Your Attack Surface

In the past, the vast majority of an organization’s attack surface was based on static ranges that were registered to that organization. This made it relatively simple to monitor the attack surface for signs of compromise and prevent intrusion by malicious actors. But things have changed. Today, most organizations have assets on so much more Continue reading…