Not only is there a lot of malware present in the Industrial Control Systems (ICS) that manage crucial infrastructure. Now, security researchers have identified specific strains that are tightly focused on interfering with electrical grids, and may be usable in many environments.Continue Reading
As cyberattacks increase in number and complexity, the IT and security professionals who are holding the fort can be stretched very thin. One way to help: automating tasks that are better done by technology.
Several years ago, my team and I set out to explore a new way to look at network security. We felt a new way was needed because some important and irrefutable trends -- the rising use of end-to-end encryption, the proliferation of connected devices, and the remaking of the IT world in the cloud -- were rendering much of traditional security obsolete...Continue Reading
Today, Cisco announced their intention to acquire Observable Networks. We view this as both a validation of our company’s realization of a big idea and an opportunity to take this big idea onto a bigger stage. We’re very excited about next steps with Cisco, the Security Business Unit and the Stealthwatch Product Team...Continue Reading