Blog

Attack Surface Lesson #2: Remote Desktop Protocol

One of the biggest trends we have observed this year is an increase in Remote Desktop Protocol (RDP) exposures across enterprises. The large uptick in RDP exposures this year is on account of the rapid shift toward remote work that many organizations were not anticipating. This has resulted in many corporate devices (laptops and even Continue reading…

Quantifying the Velocity of Digital Transformation

Everyone talks about the growth of cloud computing. Typically, revenue growth for cloud vendors has been used to demonstrate the explosion of cloud computing. Gartner has tracked the growth of cloud.  In an October 2020 report, the analyst firm wrote, “Worldwide, public cloud services will see modest growth of 6.1% in 2020, but will rebound Continue reading…

The Challenges and Consequences of US-China Technological Decoupling

$600B of IP theft from DoD’s network represents a strategic, competitive problem for the US. In 2017, the U.S. Trade Representative released a report detailing “the state of IP protection and enforcement in U.S. trading partners around the world.” Now rather famously, that report estimated that intellectual property theft costs the U.S. between $225B and Continue reading…

Mapping Your Attack Surface For Compliance

Your attack surface is in a constant state of flux. Businesses are becoming more connected through their vendors via supply chain or other digital methods—their attack surface—which is in a constant state of flux. In 2014, we witnessed the impact of a poorly protected attack surface from a cybersecurity standpoint—the Target breach through their HVAC Continue reading…

Palo Alto Networks Announces Intent to Acquire Expanse

We are thrilled that as part of the next chapter of Expanse’s journey, we have entered into a definitive agreement to join Palo Alto Networks, the world’s leading cybersecurity company. The proposed acquisition is expected to close in Palo Alto Networks’ fiscal second-quarter subject to the satisfaction of regulatory approvals and other customary closing conditions. Continue reading…

Attack Surface Lesson #1 – Know Your Inventory

I recently joined expanse as CRO.  The first thing any decent CRO does? Talk to as many customers as possible to understand market trends and customer realities. In a recent call, one CISO explained that having a complete and accurate inventory or “system of record” is the foundation of any security program. “You can’t protect Continue reading…

Tom Barsi, VP of Business Development – Why I am joining Expanse

I am thrilled to be joining Expanse at an inflection point in the company’s lifecycle, and while typically a blog post like this might explain why I joined, Expanse is such an exciting opportunity that the “why” is obvious. Last week, Expanse issued a press release citing the company’s momentum, which inspired an article in Continue reading…

Save costs and stay secure while accelerating your move to the cloud

Organizations have been forced to accelerate their digital transformation projects in light of recent demands on their network. Cloud migration brings not only operating efficiencies but also cost savings. However, organizations will be unable to see these cost and efficiency improvements when they don’t have a complete and continuous view into their attack surface. While Continue reading…

Get more out of your Governance, Risk, and Compliance (GRC) audits with Expanse

Events from the last few months have accelerated digital transformation across all organizations. While your enterprise adapts and learns to thrive, it is vital for you to adopt best practices to retain your hard-won compliance certifications such as PCI, HIPPA, NIST-800-53, and others. As a CISO, you can identify the potential risk of losing your Continue reading…