Blog

USB Security: How Do I Protect My Organization from Threats?

It’s an important question every IT organization must ask: Should I allow employees to use USB personal devices? We explore the reasons why USB devices are a top threat, starting with the difficulty in managing them, and why patches and usage rules are not enough.

Continue Reading

How Ukrainian Hackers (Temporarily) Beat Wall Street

A recent combination of hacking and insider trading gave some traders an unfair advantage. In this case, their persistence paid off, but learn what you can do to gain the upper hand.

Continue Reading

Open-Source AWS VPC Flow Logs Analysis Module for Python

Observable Networks develops the Python Programing Language module "flowlogs-reader" for reading and manipulating AWS VPC Flow Logs.

Continue Reading

Don’t Miss Us at One of Two Upcoming IANS Information Security Forums

Observable Networks will be presenting at two different IANS Information Security Forums this fall; Atlanta and Los Angeles. We are excited to meet you at one of these upcoming events.

Continue Reading

Let’s Meet Up at One of the Upcoming Data Connector Tech Security Conferences

Observable Networks will be presenting at seven different Data Connector Tech Security conferences this summer and fall. Make your plans to see us at one of these events.

Continue Reading

Agents versus VPC Flow Logs for network security monitoring

Observable Networks looks at the inadequacies of an agent based approach to monitoring cloud based servers, and how VPC flow logs can help.

Continue Reading

Could a Summer Intern Be a Security Threat?

Observable Networks examines the recent arrest of a FireEye intern who was distributing malware. Could interns also be a threat to your network security?

Continue Reading