Blog

Expanse Reveals SolarWinds Exposures and Attacker Communications

The still-unfolding breach at SolarWinds could potentially affect more than 18,000 of its customers. On December 13th, SolarWinds announced that hackers had inserted malware into a service that provides software updates for its Orion platform which is used across the U.S. government and Fortune 500 firms to monitor the health of their networks. The cyber Continue reading…

Attack Surface Lesson #2: Remote Desktop Protocol

One of the biggest trends we have observed this year is an increase in Remote Desktop Protocol (RDP) exposures across enterprises. The large uptick in RDP exposures this year is on account of the rapid shift toward remote work that many organizations were not anticipating. This has resulted in many corporate devices (laptops and even Continue reading…

Quantifying the Velocity of Digital Transformation

Everyone talks about the growth of cloud computing. Typically, revenue growth for cloud vendors has been used to demonstrate the explosion of cloud computing. Gartner has tracked the growth of cloud.  In an October 2020 report, the analyst firm wrote, “Worldwide, public cloud services will see modest growth of 6.1% in 2020, but will rebound Continue reading…

The Challenges and Consequences of US-China Technological Decoupling

$600B of IP theft from DoD’s network represents a strategic, competitive problem for the US. In 2017, the U.S. Trade Representative released a report detailing “the state of IP protection and enforcement in U.S. trading partners around the world.” Now rather famously, that report estimated that intellectual property theft costs the U.S. between $225B and Continue reading…

Mapping Your Attack Surface For Compliance

Your attack surface is in a constant state of flux. Businesses are becoming more connected through their vendors via supply chain or other digital methods—their attack surface—which is in a constant state of flux. In 2014, we witnessed the impact of a poorly protected attack surface from a cybersecurity standpoint—the Target breach through their HVAC Continue reading…

Palo Alto Networks Announces Intent to Acquire Expanse

We are thrilled that as part of the next chapter of Expanse’s journey, we have entered into a definitive agreement to join Palo Alto Networks, the world’s leading cybersecurity company. The proposed acquisition is expected to close in Palo Alto Networks’ fiscal second-quarter subject to the satisfaction of regulatory approvals and other customary closing conditions. Continue reading…

Attack Surface Lesson #1 – Know Your Inventory

I recently joined expanse as CRO.  The first thing any decent CRO does? Talk to as many customers as possible to understand market trends and customer realities. In a recent call, one CISO explained that having a complete and accurate inventory or “system of record” is the foundation of any security program. “You can’t protect Continue reading…

Tom Barsi, VP of Business Development – Why I am joining Expanse

I am thrilled to be joining Expanse at an inflection point in the company’s lifecycle, and while typically a blog post like this might explain why I joined, Expanse is such an exciting opportunity that the “why” is obvious. Last week, Expanse issued a press release citing the company’s momentum, which inspired an article in Continue reading…

Save costs and stay secure while accelerating your move to the cloud

Organizations have been forced to accelerate their digital transformation projects in light of recent demands on their network. Cloud migration brings not only operating efficiencies but also cost savings. However, organizations will be unable to see these cost and efficiency improvements when they don’t have a complete and continuous view into their attack surface. While Continue reading…