Blog

Introducing the Expander Cloud Module

While business has been occupied with digital transformation, attackers are taking advantage of the security gaps that result from the speed that assets are created and the lack of visibility that organizations have into these assets. In an effort to curtail some of the issues that have come with rapid cloud development, organizations have begun Continue reading…

The Internet Is Small

Do you think you’re safe because no one can find you on the vast Internet? Think again. Technology breakthroughs have made it possible for us to scan the entire public Internet much faster than ever before, and as a result, the Internet has become small. Fifteen years ago, it took a team of researchers with Continue reading…

Digital Transformation’s Hangover

Expanse’s CEO, Tim Junio, discusses why it would be easy to conclude we’re on the verge of ceding the Internet to criminals and spy agencies. But there are reasons to be optimistic. It would be easy to conclude we’re on the verge of ceding the Internet to criminals and spy agencies. But there are reasons Continue reading…

Why Do Your Services Still Support TLS 1.0?

TLSv1.0 and problematic ciphersuites are incredibly prevalent on the public internet, but the legacy browsers that require them are not. Why are they still on your perimeter?

Misconfigured Datastore Services Abound in the Cloud

Cloud hosting provides great flexibility for your developers. They are lured to the cloud by promises of rapid deployments and order-of-magnitude decreases in maintenance costs. But this agility comes with security risks as new services are deployed without adequate safeguards for security and compliance. Not only do improperly configured cloud environments pose a significant risk Continue reading…