Blog

Monolith to Microservices Part 3: Our Solution

This post is part of a 3-part series on Expanse’s transition to a Microservices [1] Architecture built on Java and Spring Boot. In this series, we seek to share the issues we faced with the monolithic system, why we think the Spring Boot-based services will address them, and how we are affecting this change, with Continue reading…

Shiny Things: Why Your Certificates Matter

Who really ever wants to be a target? Unless it is of someone’s affection, it is pretty much never a good thing. Especially in the world of cybersecurity. Now don’t get me wrong, it doesn’t take much to attract the attention of someone hacking for fun, profit, or even to make a statement, but sometimes we do things that attract unnecessary attention to ourselves.

If You Leave It, They Will Come

Security through obscurity has been rebuffed by laymen and experts, but even the most security-aware organizations still rely on it.

Introducing the Expander Cloud Module

While business has been occupied with digital transformation, attackers are taking advantage of the security gaps that result from the speed that assets are created and the lack of visibility that organizations have into these assets. In an effort to curtail some of the issues that have come with rapid cloud development, organizations have begun Continue reading…