Exe_blog_100.jpg

Welcome to the exe blog. A new space for aha’s and executable tips and tricks.


Featured post | Expel Insider
by David Merkel

The security people's guide to Expel's exe blog

My colleagues and I at Expel are new here. You’ll be hearing quite a bit more about us in the future. So let me take just a couple minutes to introduce who we are and why you might care. Note I said who we are, not what we do.


Tips  |  1 min read Heads up: WPA2 vulnerability A quick overview of the reported WPA2 weakness.

Tips  |  1 min read

Heads up: WPA2 vulnerability

A quick overview of the reported WPA2 weakness.

Security operations  |  5 min read Budget planning: determining your security spend Guidance and a short list of things you can do to help you answer the common question "how much should I spend on cybersecurity?"

Security operations  |  5 min read

Budget planning: determining your security spend

Guidance and a short list of things you can do to help you answer the common question "how much should I spend on cybersecurity?"

Security operations  |  5 min read How to avoid shelfware Set yourself up for success by asking these four questions before you purchase new security products.

Security operations  |  5 min read

How to avoid shelfware

Set yourself up for success by asking these four questions before you purchase new security products.

TLNT | 4 min read Mission matters: watch your signals Here are four things you can start working on today to set the tone for security in your organization that will have a lasting impact on your team. Part 3 of keep your security nerds happy series

TLNT | 4 min read

Mission matters: watch your signals

Here are four things you can start working on today to set the tone for security in your organization that will have a lasting impact on your team.

Part 3 of keep your security nerds happy series

Security operations  |  4 min read Mistakes to avoid when measuring SOC performance Discover the three most common mistakes companies make when developing their first set of operational metrics.

Security operations  |  4 min read

Mistakes to avoid when measuring SOC performance

Discover the three most common mistakes companies make when developing their first set of operational metrics.

Tips  | 9 min read From webshell weak signals to meaningful alert in four steps Walk through a practical example of how you can make a weak signal actionable by combining events from your endpoint and network security technologies into one meaningful alert.

Tips  | 9 min read

From webshell weak signals to meaningful alert in four steps

Walk through a practical example of how you can make a weak signal actionable by combining events from your endpoint and network security technologies into one meaningful alert.

TLNT  |  3 min read Don't dam upstream: ways to build a feedback loop Review four approaches to strengthen your security operations feedback loop and ensure analysts can influence detection.   Part 2 of keep your security nerds happy series

TLNT  |  3 min read

Don't dam upstream: ways to build a feedback loop

Review four approaches to strengthen your security operations feedback loop and ensure analysts can influence detection.
 

Part 2 of keep your security nerds happy series

TLNT  |  4 min read Get your security tools in order: seven tactics you should know Do you have the equipment and material needed to get your work right? Here are seven things to keep in mind to bring harmony to your toolchain. Part 1 of keep your security nerds happy series

TLNT  |  4 min read

Get your security tools in order: seven tactics you should know

Do you have the equipment and material needed to get your work right? Here are seven things to keep in mind to bring harmony to your toolchain.

Part 1 of keep your security nerds happy series

Tips | 6 min read A cheat sheet for managing your next security incident Tactical advice on how to survive a security incident when you don’t have an incident response plan.

Tips | 6 min read

A cheat sheet for managing your next security incident

Tactical advice on how to survive a security incident when you don’t have an incident response plan.

Tips | 8 min read How to triage Windows endpoints by asking the right questions The three parts of the investigative mindset and how to apply them when you triage endpoint alerts.

Tips | 8 min read

How to triage Windows endpoints by asking the right questions

The three parts of the investigative mindset and how to apply them when you triage endpoint alerts.

TLNT | 3 min read Five ways to keep your security nerds happy Hiring and keeping good IT / security practitioners can be tough, so once you’ve got good talent you’ll need to work to keep them. Here are five ways to make them happy and keep them coming back.

TLNT | 3 min read

Five ways to keep your security nerds happy

Hiring and keeping good IT / security practitioners can be tough, so once you’ve got good talent you’ll need to work to keep them. Here are five ways to make them happy and keep them coming back.