By Haley Sayres - March 1, 2019
This post is part of a 3-part series on Expanse’s transition to a Microservices [1] Architecture built on Java and Spring Boot. In this series, we seek to share the issues we faced with the monolithic system, why we think the Spring Boot-based services will address them, and how we are affecting this change with… Continue reading…
By Seth Ford - February 25, 2019
Security through obscurity has been rebuffed by laymen and experts, but even the most security-aware organizations still rely on it.
By Haley Sayres - February 19, 2019
While business has been occupied with digital transformation, attackers are taking advantage of the security gaps that result from the speed that assets are created and the lack of visibility that organizations have into these assets. In an effort to curtail some of the issues that have come with rapid cloud development, organizations have begun… Continue reading…
By Seth Ford - February 11, 2019
RDP and other productivity-enhancing tools leave organizations exposed to attacks on their ever-changing attack surface.
By Marshall Kuypers - January 31, 2019
What tools to use to analyze the data that you’ve collected to gain actionable insights into your cyber risk.
By Marshall Kuypers - January 29, 2019
Where to get the data you need to accurately assess cyber risk.
By Marshall Kuypers - January 24, 2019
Why we need data to assess organizational cyber risk.
By Marshall Kuypers - November 26, 2018
Do you think you’re safe because no one can find you on the vast Internet? Think again. Technology breakthroughs have made it possible for us to scan the entire public Internet much faster than ever before, and as a result, the Internet has become small. Fifteen years ago, it took a team of researchers with… Continue reading…
By Expanse Co-Founder and CEO Tim Junio - November 8, 2018
Expanse’s CEO, Tim Junio, discusses why it would be easy to conclude we’re on the verge of ceding the Internet to criminals and spy agencies. But there are reasons to be optimistic. It would be easy to conclude we’re on the verge of ceding the Internet to criminals and spy agencies. But there are reasons… Continue reading…