AnnouncementCase StudyData Sheetposts
skip to Main Content

Welcome to the exe blog. A new
space for aha’s and executable tips and tricks.

Subscribe



Featured Post

How to disrupt attackers and enable defenders using resilience

So… what is resilience? We’ll cover that and also how it works in this post. We’ve even thrown in a couple examples to get you started.

Continue reading

What our customers have taught us

After working with customers over the last year we’ve learned a whole lot more. Did we nail it?

Managed detection and response (MDR): symptom or solution?

An uncommonly clear review of what managed detection and response (MDR) is, where it came from and what it can/can't do for you.

Decoded: new changes to NIST’s Cybersecurity Framework

NIST has polished up their Cybersecurity Framework based on thousands of organizations implementing it over the past three years. Our CISO, Bruce Potter, highlights three of the most significant (and practical) changes.

What’s endpoint detection and response (EDR) and when should you care?

We cut through the hype to explain what EDR products can do for you.

Learning is fundamental

How to make change to create a learning environment and "The Three Ways" to bring order to your SOC. Part 5 of keep your security nerds happy series.

Ready. Set. Go. Welcome to Expel.

Wow, it’s launch day. We’ve been so heads-down over the past year and change, building tech and working with customers, it seems crazy to think we’re here. I’m really excited to tell you about what we’ve been up to. tl;dr:…

Warning signs that your MSSP isn’t the right fit

Look out for these five indicators that it's probably time to start considering alternatives to your managed security services provider. Plus, questions to ask to avoid these traps.

Recruit for team dauntless

A sample of questions posed in a recent interview, as we searched for the next member of our security team, and how to hire the fearlessly determined. Part 4 of keep your security nerds happy series

Budget planning: determining your security spend

Guidance and a short list of things you can do to help you answer the common question "how much should I spend on cybersecurity?"

Heads up: WPA2 vulnerability

A (very) quick overview of the reported WPA2 weakness.

How to avoid shelfware

Set yourself up for success by asking these four questions before you purchase new security products.

Mission matters: watch your signals

Here are four things you can start working on today to set the tone for security in your organization that will have a lasting impact on your team. Part 3 of keep your security nerds happy series

Mistakes to avoid when measuring SOC performance

Discover the three most common mistakes companies make when developing their first set of operational metrics.

From webshell weak signals to meaningful alert in four steps

Walk through a practical example of how you can make a weak signal actionable by combining events from your endpoint and network security technologies into one meaningful alert.

Don’t dam upstream: ways to build a feedback loop

Review four approaches to strengthen your security operations feedback loop and ensure analysts can influence detection. Part 2 of keep your security nerds happy series

Get your security tools in order: seven tactics you should know

Do you have the equipment and material needed to get your work right? Here are seven things to keep in mind to bring harmony to your toolchain. Part 1 of keep your security nerds happy series

Five ways to keep your security nerds happy

Hiring and keeping good IT / security practitioners can be tough, so once you’ve got good talent you’ll need to work to keep them. Here are five ways to make them happy and keep them coming back.

How to triage Windows endpoints by asking the right questions

The three parts of the investigative mindset and how to apply them when you triage endpoint alerts.

A cheat sheet for managing your next security incident

Tactical advice on how to survive a security incident when you don’t have an incident response plan.

The security people’s guide to Expel’s exe blog

My colleagues and I at Expel are new here. You’ll be hearing quite a bit more about us in the future. So let me take just a couple minutes to introduce who we are and why you might care. Note I said who we are, not what we do.

Load more

Back To Top