Blog

Cloud Computing and AWS Transform Data Security (and More)

The third in a three-part series on how to think about security in AWS environments.

Cloud infrastructures such as AWS (Amazon Web Services) encourage rapid change in the companies that use them, according to a new Observable white paper. Cloud attributes including vast amounts of data, fast response, and continual updates may require companies that use AWS to adopt new approaches to data security; but in return, their core operations can be continuously improved. 

Continue Reading

Three Cyberthreats AWS Log Data Doesn't Show You

There are many cyber threats not detected by examining configuration vulnerabilities. Read about the three cyber threats that AWS log data and tools don't show you.

AWS CloudTrail, Amazon CloudWatch and VPC Flow Logs, Amazon Web Services (AWS) automatically indexes network metadata and Amazon Inspector is there to audit virtual server configurations and identify weak spots in applications. However, there are many cyber threats not detected by examining configuration vulnerabilities. Read on to learn about  three cyber threats that AWS log data and tools don't show you.

Continue Reading

IP and Port Scan Alerts

This post will describe how to look at alerts from Observable for network scans, which tends to be harder to judge.


Continue Reading

Anticipate, Defend Security Threats in an AWS Environment

The second in a three-part series on new ways to think about security in AWS environments.

A new Observable whitepaper demonstrates how Amazon Web Services (AWS) provides security in the cloud while still highlighting the challenges that remain for Amazon, its partners, and their customers. This article examines the ways you can anticipate – and combat – the known and unknown threats to security in an AWS environment.

Continue Reading

Static Devices and Detecting Deviations

Observable’s Endpoint Modeling is good at monitoring the “Internet of Things” things. Not only workstations and servers, but printers, phones, cameras, sensors, or industrial devices, and others devices that are found on many networks. It’s possible to identify subtle changes in behavior (that might indicate a compromise) without producing lots of nuisance alerts.

Continue Reading