Authors

Ron Sterbenz

Vice President & GM, Corporate Marketing and eCommerce

Ron Sterbenz

Ron Sterbenz is the vice president and general manager of Corporate Marketing and eCommerce team at Observable Networks where he is responsible for developing and executing new marketing strategies, increasing brand awareness, and managing Observables Web strategies and presence.

Blog posts by Ron Sterbenz

Malware Targets the Electric Grid

Sophisticated malware that has proven its ability to interfere with power systems could be coming to an electric grid near you.

Not only is there a lot of malware present in the Industrial Control Systems (ICS) that manage crucial infrastructure. Now, security researchers have identified specific strains that are tightly focused on interfering with electrical grids, and may be usable in many environments. 

Continue Reading

Mind the Gap (in Cybersecurity Talent)

The growing shortage of cybersecurity talent puts IT assets and data at risk.

As cyberattacks increase in number and complexity, the IT and security professionals who are holding the fort can be stretched very thin. One way to help: automating tasks that are better done by technology.

Continue Reading

Monitoring – and Securing – Serverless Computing Architectures

Learn more about serverless architectures, and how to secure them with a new whitepaper.

Increasing demand for serverless architectures, such as Amazon Web Services Lambda, poses a new security threat because traditional tools are not equipped to monitor these functions. This article – and a new whitepaper – shows you how you can overcome these vulnerabilities. 

Continue Reading

More Details on the WannaCry Ransomware Attack

Additional details on the WannaCry attack

We recently wrote a technical blog that showed how users could detect the WannaCry malware using Observable’s security service. Here, we take a closer look at some additional details, including what happened, why, and additional suggestions for preventing similar attacks.

Continue Reading

Time to Pay Attention to ICS

A backlog of malware within ICS (industrial control systems) environments poses a threat to critical infrastructure that could have dire consequences.

The ICS systems that manage crucial infrastructure such as energy, power, water, and transportation are likely to be hosting malware, according to new research. As these systems are increasingly connected to private and public networks, they become more tempting targets for those who wish to do harm. 

Continue Reading

Infographic: "Five Types of Modeling Necessary to Protect Your Data"

A new infographic shows how endpoint modeling improves cloud-based security.

Download our latest infographic to see why you need analytics-driven detection capabilities for true security in the cloud.

Continue Reading

Common Corporate Security Problems: Where Are You Most Vulnerable?

Most cyber attackers continue to exploit the same handful of common corporate network security vulnerabilities. Do you know where you are the most vulnerable?

Common security problems continue to plague companies and delight the hackers who exploit them. Learn about seven common vulnerabilities that hackers look for, and what your organization and employees can do to protect themselves.

Continue Reading

Infographic: “Old Security Doesn’t Work in the Cloud Era”

Compelling data on the latest state of cybersecurity.

Download our latest infographic to see why you need analytics-driven detection capabilities for true security in the cloud.

Continue Reading

How to Survive the Cybersecurity Talent Gap

With not enough “watchdogs” available to secure IT resources, employers are becoming more innovative, both in recruiting and in using automated solutions.

The shortfall of qualified cybersecurity workers poses an immediate problem and a near-term one for employers. While creative approaches to talent management may address the “pipeline” challenge, an innovative class of security solution is helping to safeguard IT resources today. 

Continue Reading

Plugging the Gaps in SIEMs and Log-Management Systems

Security analysts now have an alternative to drowning in log data.

In a new video, Observable founder and CTO Patrick Crowley explains how the combination of SIEMs (or log-management systems) and endpoint modeling can attack the problem of information overload, for the benefit of those who feel it most sharply: security analysts. 

Continue Reading