Resources

DOD Supply Chain: Tracking the Digital Attack Surface

Nation states are engaging in systemic intellectual property theft against the US through weak links in complex supply chains. Despite having cybersecurity programs that vary in ...
Read More

Discover and Track Your Global Cloud Footprint

Learn how to avoid the security gaps caused by unknown cloud assets—those set up outside of policy or using insecure configurations—and how you can gain continuous ...
Read More

Understanding Common Perimeter Exposures

In this webinar from Expanse, Dr. Marshall Kuypers discusses common perimeter exposures that organizations should be worried about ...
Read More

Attack Surface Reduction

Expanse's Lisa Wallace discusses network attack surface and explains how companies can launch attack surface reduction initiatives to reduce their exposure to attacks ...
Read More

Demystifying Major Breaches – WannaCry

Expanse's Pamela Toman, Staff Data Scientist, will conduct a deep dive into malware attacks in recent years, the methods they've used, and the vulnerabilities they've exploited ...
Read More