Blog

BlueKeep: The Threat Is Real and Here’s What You Should Do

It’s official — a successful exploit of BlueKeep has been spotted in the wild. Since Microsoft first warned the public about the Remote Desktop Protocol (RDP) vulnerability BlueKeep, security professionals and researchers have been waiting to see a documented case of bad actors taking advantage of the vulnerability. And on November 2, security researcher Kevin Continue reading…

Riding The 2019 Forrester Wave™ for Vulnerability Risk Management

Great things are happening at Expanse. The latest is being named a Strong Performer by Forrester in The Forrester Wave™: Vulnerability Risk Management, Q4 2019. It’s our rookie year on The Forrester Wave™, and we’re thrilled to have placed where we did. The reason: even though we’re not a legacy Vulnerability Risk Management (VRM) tool, Continue reading…

Announcing the Launch of Expanse Link

At Expanse, we’re passionate about empowering the world’s largest companies and government organizations to innovate safely and leverage the power of the Internet without fear. Once, the Internet was seen as a playground where innovators could explore and share information safely and without limits. But today, the majority of attacks start via external vectors, making Internet Assets and Services a constant source of cyber risk. Expanse solves this challenge by providing leading organizations with a system of record for all of their Internet assets and an understanding of the risks posed by any assets that are exposed.

Meet the New Expander Technical Add-On for Splunk

Matt Kraning

At Expanse, we’re constantly looking to improve the experience of our customers by innovating on our core products, Expander and Behavior, and by providing integrations with other leading security and IT platforms. To deliver on this commitment, we’re excited to announce we’ve rolled out a new version of the Expander Technical Add-On (TA) for Splunk. Continue reading…

A Tale of Three Expanse Customers

The Internet is a small place. Attackers can scan the Internet in under an hour and get a list of every RDP, database, and abandoned web server out there. Because attackers can find exposed assets quickly, it’s important for organizations to reduce their attack surface so there are fewer opportunities for unauthorized entry. At Expanse, Continue reading…

3 Must-See Sessions at Black Hat 2019

It’s that time of the year again: Black Hat 2019 is almost here. As always, it should be a great event with top-of-the-line keynotes, fascinating sessions, amazing options from the vendor community (Expanse included), and of course an opportunity to mingle with friends and colleagues in the security industry.   With nearly 19,000 attendees and hundreds of Continue reading…

US Federal Agency Boosts Security

Problem A key US federal government agency had information siloed between the agency’s headquarters, security operations center, and various field locations. This made it challenging to enforce security and IT policies across a decentralized network and led to numerous unknown, unmanaged and vulnerable Internet-connected assets.  Solution The agency worked with Expanse to define its global Continue reading…

How to Implement Policies to Secure Your Network

Certain security basics used to be good enough to protect your network. You could roll out an endpoint security tool, implement a firewall, and use sandboxing, and at least sleep a little easier at night. But today’s attackers are more sophisticated, and that means security professionals have to be more sophisticated, too.  A key part Continue reading…