RDP and BlueKeep: What You Need To Know

On May 14th, 2019, Microsoft released a patch for a pre-authentication vulnerability affecting several versions of Windows. Microsoft even released a patch for end-of-life software because the vulnerability is so serious that it has the potential to create a WannaCry-styled global outbreak. In this post, we’ll talk about RDP, the vulnerability, and how you can Continue reading…

3 Security Issues Every Organization Should Worry About

When I worked as a cybersecurity consultant at one of the Big Four auditing and professional services firms, I got a front-row seat to the security challenges facing enterprises today. I learned to be skeptical of the cyber maturity of the “big guys,” or the large and well-established enterprises that are connected to the daily lives of millions. While working with clients of all sizes across multiple industries, I realized very few organizations have even a decent grip on their actual cybersecurity posture.

The Most Surprising Lessons From My First Months at Expanse

Every new role brings new challenges and surprises with it. My first month at Expanse has been a firehose of information and training sessions, all of which I expected to have during the first month at a new job. But during my one-month check-in with my manager, one thing that I didn’t expect was to be asked: “What’s surprised you the most?”

Your Attack Surface Problem Is Really an Asset Management Problem

The foundation of effective security is knowing what you need to protect. Without a full inventory of your Internet-connected assets, you don’t have a clear picture of your attack surface. And that means you can’t identify and remediate exposures. While many organizations today may think they understand their attack surface, the truth is that they don’t because of a fundamental breakdown in asset management and governance.

When Attackers Need Minutes, Not Hours

Machine-speed attacks mean even brief exposures can be damaging It has never been more important for organizations to track and monitor their full, global Internet attack surface. Recent research shows that malicious actors can find and attempt to exploit exposures that are up for only minutes. Attackers using sophisticated tools to scan the entire Internet Continue reading…

Managing Application Side-Effects: An Introduction to Redux-Saga

Before you begin… This article consists of two parts: first understanding side-effects and how they relate to Redux, and then digging into the fundamentals of Redux-Saga. Feel free to skip to the Redux-Saga section if you are purely interested on jump-starting your understanding of Redux-Saga. But if you are still uncertain about whether Redux-Saga is Continue reading…