Blog

Cisco Today Announces Intention to Acquire Observable Networks

Today, Cisco announced their intention to acquire Observable Networks.  We view this as both a validation of our company’s realization of a big idea and an opportunity to take this big idea onto a bigger stage. We’re very excited about next steps with Cisco, the Security Business Unit and the Stealthwatch Product Team...

Continue Reading

Time to Pay Attention to ICS

A backlog of malware within ICS (industrial control systems) environments poses a threat to critical infrastructure that could have dire consequences.

The ICS systems that manage crucial infrastructure such as energy, power, water, and transportation are likely to be hosting malware, according to new research. As these systems are increasingly connected to private and public networks, they become more tempting targets for those who wish to do harm. 

Continue Reading

Infographic: "Five Types of Modeling Necessary to Protect Your Data"

A new infographic shows how endpoint modeling improves cloud-based security.

Download our latest infographic to see why you need analytics-driven detection capabilities for true security in the cloud.

Continue Reading

Common Corporate Security Problems: Where Are You Most Vulnerable?

Most cyber attackers continue to exploit the same handful of common corporate network security vulnerabilities. Do you know where you are the most vulnerable?

Common security problems continue to plague companies and delight the hackers who exploit them. Learn about seven common vulnerabilities that hackers look for, and what your organization and employees can do to protect themselves.

Continue Reading

Infographic: “Old Security Doesn’t Work in the Cloud Era”

Compelling data on the latest state of cybersecurity.

Download our latest infographic to see why you need analytics-driven detection capabilities for true security in the cloud.

Continue Reading

How to Survive the Cybersecurity Talent Gap

With not enough “watchdogs” available to secure IT resources, employers are becoming more innovative, both in recruiting and in using automated solutions.

The shortfall of qualified cybersecurity workers poses an immediate problem and a near-term one for employers. While creative approaches to talent management may address the “pipeline” challenge, an innovative class of security solution is helping to safeguard IT resources today. 

Continue Reading

Plugging the Gaps in SIEMs and Log-Management Systems

Security analysts now have an alternative to drowning in log data.

In a new video, Observable founder and CTO Patrick Crowley explains how the combination of SIEMs (or log-management systems) and endpoint modeling can attack the problem of information overload, for the benefit of those who feel it most sharply: security analysts. 

Continue Reading

Read our New ebook: “Closing Cloud Security Gaps”

Download this new ebook to see exactly how Observable Cloud addresses security concerns from moving to the cloud.

From CloudTrail to VPC Flow Logs, Amazon Web Services provide great services to enhance visibility within your cloud environment, but operating within the shared responsibility model means that you still have responsibilities. Download the Observable Networks ebook and learn how Observable Cloud, by working in concert with many of your existing AWS security solutions, provides the controls you need to feel confident that you are operating securely in the cloud.

Continue Reading

The Evolution of Cybersecurity in the Cloud [Infographic]

Click on to learn more about the evolution of Cybersecurity in the Cloud.

Continue Reading

Observable Networks Looks Back at 2016 and Forward to 2017

Because we focus on advanced threat detection, around this time of year, I take in what happened in terms of network security during the past year and look ahead into the next year. Below are some of my observations.

Continue Reading