Cloud infrastructures such as AWS (Amazon Web Services) encourage rapid change in the companies that use them, according to a new Observable white paper. Cloud attributes including vast amounts of data, fast response, and continual updates may require companies that use AWS to adopt new approaches to data security; but in return, their core operations can be continuously improved.Continue Reading
AWS CloudTrail, Amazon CloudWatch and VPC Flow Logs, Amazon Web Services (AWS) automatically indexes network metadata and Amazon Inspector is there to audit virtual server configurations and identify weak spots in applications. However, there are many cyber threats not detected by examining configuration vulnerabilities. Read on to learn about three cyber threats that AWS log data and tools don't show you.Continue Reading
This post will describe how to look at alerts from Observable for network scans, which tends to be harder to judge.
A new Observable whitepaper demonstrates how Amazon Web Services (AWS) provides security in the cloud while still highlighting the challenges that remain for Amazon, its partners, and their customers. This article examines the ways you can anticipate – and combat – the known and unknown threats to security in an AWS environment.Continue Reading
Observable’s Endpoint Modeling is good at monitoring the “Internet of Things” things. Not only workstations and servers, but printers, phones, cameras, sensors, or industrial devices, and others devices that are found on many networks. It’s possible to identify subtle changes in behavior (that might indicate a compromise) without producing lots of nuisance alerts.Continue Reading