ExpelA common sense approach for assessing third-party riskLet us walk you through our third-party assessment process.Dec 16, 2020Dec 16, 2020
ExpelMFA is not a silver bullet to secure your cloud emailThink MFA will be your web mail’s knight in shining armor when a crafty attacker strikes? Think again.Dec 2, 2020Dec 2, 2020
ExpelSeven ways to spot a business email compromise in Office 365As attackers behind BEC attacks find ever more clever tactics to use, it’s getting trickier for businesses to protect themselves.Nov 18, 2020Nov 18, 2020
ExpelWhat is (cyber) threat hunting and where do you start?We want to demystify what hunting is and what it’s not. So here goes nothin’ …Nov 4, 2020Nov 4, 2020
ExpelFinding evil in AWS: A key pair to rememberOur analysts had to think fast when they recently encountered an incident involving compromised AWS access keys. Find out more.Oct 21, 2020Oct 21, 2020
ExpelHow much does it cost to build a 24x7 SOC?Not all SOCs are created equal. To figure out how much it costs to go 24x7, you have to figure out what kind of SOC you’re trying to build.Oct 7, 2020Oct 7, 2020
Expel7 habits of highly effective SOCs — ExpelWondering what it takes to build an effective SOC full of motivated, happy analysts? We’ve got some thoughts on that.Nov 5, 2019Nov 5, 2019