Blog

Ransomware Attacks on the Rise Targeting Hospitals and Federal Agencies

Don’t let your data be held ransom

Ransomware attacks are on the rise, targeting corporate networks, hospitals and now federal agencies. Find out how serious the threat is, and what you can do to protect your organization.

Continue Reading

Introducing kinesis-logs-reader

Learn more about kinesis-logs-reader, which was introduced last week at Seattle AWS User Group.

This blog post introduces kinesis-logs-reader, an open-source Python library and command line tool for working with large volumes of Amazon VPC Flow Logs (and other Cloud Watch Logs data) using Kinesis. We gave a live demo of the new tool to the group of Seattle AWS Architects & Engineers at the SURF Incubator last week.

Continue Reading

Ovum Report: How Endpoint Modeling Enhances Traditional Threat Detection

A closer look at why Ovum Consulting recommends putting endpoint modeling on your radar.

200 days is a long time for threats to remain undetected within your network. Find out why Ovum recommends endpoint modeling as a cost-effective enhancement to your current threat detection strategy, as a means to decrease the time it takes to detect threats.

Continue Reading

Who’s Minding the Data Store?

The massive Panama Papers data breach holds valuable lessons for anyone responsible for securing IT systems and data.

The sheer scope of “the biggest data leak in history” has prompted many to wonder, how could the diversion of 2.6 terabytes of data go unnoticed? But while the postmortems may be fascinating, the most useful takeaway from this episode may be the crucial importance of maintaining real-time visibility into your network and where your data is going.

Continue Reading