Resources

Shiny things: Why your certificates matter

Who really ever wants to be a target? Unless it is of someone’s affection, it is pretty much never a good thing. Especially in the world ...
Read More

A Transition from Monolith to Microservices Part 2: Finding a Solution

This post is part of a 3-part series on Expanse’s transition to a Microservices Architecture built on Java and Spring Boot. In this series, we seek ...
Read More

Tracking Your Ever-Changing Internet Edge

Your organization’s Internet Edge is made up of all of the devices, infrastructure, and services that are Internet-exposed. Adversaries are constantly searching the global Internet for ...
Read More

A Transition from Monolith to Microservices Part 1: Deciding to Transition

This post is part of a 3-part series on Expanse’s transition to a Microservices [1] Architecture built on Java and Spring Boot. In this series, we ...
Read More

Discover and Track Your Global Cloud Footprint

Learn how to avoid the security gaps caused by unknown cloud assets—those set up outside of policy or using insecure configurations—and how you can gain continuous ...
Read More

If You Leave It, They Will Come

Security through obscurity has been rebuffed by laymen and experts, but even the most security-aware organizations still rely on it ...
Read More

Introducing the Expander Cloud Module

While business has been occupied with digital transformation, attackers are taking advantage of the security gaps that result from the speed that assets are created and ...
Read More

Machine-speed attacks create new security risks for remote workforce technologies

RDP and other productivity-enhancing tools leave organizations exposed to attacks on their ever-changing attack surface ...
Read More

Part 3: Quantitative Methods for Assessing Cyber Risk

What tools to use to analyze the data that you've collected to gain actionable insights into your cyber risk ...
Read More

Part 2: Quantitative Methods for Assessing Cyber Risk

Where to get the data you need to accurately assess cyber risk ...
Read More

Quantitative Methods for Assessing Cyber Risk

Why we need data to assess organizational cyber risk ...
Read More

Discover and Track Your Cloud Footprint

Download our tech brief, Discovering Your Total Cloud Footprint, to understand how to reduce your attack surface by integrating a continuous, outside-in perspective of your Internet ...
Read More

Quantitative Risk in Cyber Systems

Expanse's Dr. Marshall Kuypers presents a case study from a large organization showing how historical incident data can be used to quantify cyber risk and return on ...
Read More

The Internet Is Small

Do you think you’re safe because no one can find you on the vast Internet? Think again ...
Read More

Know Your Unknowns With a Master IP Address List Audit

Knowing your network is the most foundational step in building a secure organization, but many organizations overlook important edge cases and even mundane events that lead ...
Read More

Digital Transformation’s Hangover

Expanse's CEO, Tim Junio, discusses why it would be easy to conclude we're on the verge of ceding the Internet to criminals and spy agencies. But ...
Read More

Behavior Product Sheet

Expanse Edge Behavior dynamically analyzes network Edge communications across the global Internet to detect and stop risky and out of policy activities occurring on your Internet ...
Read More

Expander Product Sheet

Until now, there has been no way for organizations to understand what their Internet Edge looks like to attackers, including company assets unintentionally exposed to the ...
Read More

Enterprise Cybersecurity in the Age of the Machine Internet

Dr. Matt Kraning, CTO and Co-Founder of Expanse, describes how the human internet is giving way to the Machine Internet: the unseen labyrinth of devices, endpoints, ...
Read More

Facts, Trends, Risks, and Global Exposures for the Fortune 100

In this presentation, Dr. Marshall Kuypers, the Head of Cyber Risk at Expanse, provides an in-depth look at historical trends and current state of global cyber ...
Read More

Understanding Common Perimeter Exposures

In this webinar from Expanse, Dr. Marshall Kuypers discusses common perimeter exposures that organizations should be worried about ...
Read More

Attack Surface Reduction

Expanse's Lisa Wallace discusses network attack surface and explains how companies can launch attack surface reduction initiatives to reduce their exposure to attacks ...
Read More

Demystifying Major Breaches – WannaCry

Expanse's Pamela Toman, Staff Data Scientist, will conduct a deep dive into malware attacks in recent years, the methods they've used, and the vulnerabilities they've exploited ...
Read More

Tim Junio Interview on 20VC

Tim Junio is the Co-Founder and CEO @ Expanse, the startup that creates and organizes knowledge about the world’s devices. They are backed by some of ...
Read More

The Entrepreneurial Engineer

Speaker: Matt Kraning, Expanse ...
Read More

Why do your services still support TLS 1.0?

TLSv1.0 and problematic ciphersuites are incredibly prevalent on the public internet, but the legacy browsers that require them are not. Why are they still on your ...
Read More

Misconfigured datastore services abound in the cloud

Cloud hosting provides great flexibility for your developers. But this agility comes with security risks. Cloud hosting provides great flexibility for your developers. They are lured ...
Read More