Expel
Expel is the leading managed detection and response (MDR) provider trusted by some of the world’s most recognizable brands to expel their adversaries, minimize risk, and build security resilience.
Episode 3: Building an AI-powered security practice | The Job Security Podcast
The current state of managed detection and response (MDR) | Nerdy 30, Episode 4
Our take on single vendor ecosystem and advice for a security leader who's drowning in alerts
When evaluating if detection is actually working well, what kind of metrics are you looking at?
How do you balance the need for comprehensive coverage with data sources that add more noise?
When building a detection program, where would you focus on first and why?
What role does context play in turning a low confidence signal into something more actionable?
Is more always better when it comes to detections?
Stories from the SOC: The curious case of termination notices
How do you think about about the relationship between detection quality and analyst burnout?
What's the difference between an alert and a detection?
Episode 2: THOR: Love and Thrunder | The Job Security Podcast
How Expel does detections | Identity
Threat detection engineering 101 | Very Important Questions
When threats come from inside the house | SOC Bytes
What are the keys to developing a strong culture within a security operations team?
How can I ensure my security operations center (SOC) is not sacrificing quality for efficiency?
What are some leading indicators that predict security operations center (SOC) performance?
What does the security operations center (SOC) alert lifecycle look like?
How should I verify the data that's coming out of my security operations center (SOC)?
How can security operations center (SOC) metrics be misleading when viewed in isolation?
Where do you find measurable data for your security operations center (SOC)?
Episode 1: The cyber kids are alright | The Job Security Podcast
James Shank on threat intelligence, madness, and mayhem | Meet the Expletives
What role does visibility or context play in cybersecurity remediation actions?
What's an example of a cybersecurity auto remediation with a big impact?
How do you measure the impact of auto remediations in cybersecurity?
What are auto remediation actions?
The 4 keys to building trust in cybersecurity automation