Blog

Monitoring Serverless Architectures in AWS

An article that discusses the methods for auditing and monitoring serverless architectures in AWS.

This article will discuss methods of auditing and monitoring of AWS Lambda functions (a key component of serverless architectures in AWS), and how the Observable Networks service puts these methods into practice.

Continue Reading

Common Corporate Security Problems: Where Are You Most Vulnerable?

Most cyber attackers continue to exploit the same handful of common corporate network security vulnerabilities. Do you know where you are the most vulnerable?

Common security problems continue to plague companies and delight the hackers who exploit them. Learn about seven common vulnerabilities that hackers look for, and what your organization and employees can do to protect themselves.

Continue Reading

Infographic: “Old Security Doesn’t Work in the Cloud Era”

Compelling data on the latest state of cybersecurity.

Download our latest infographic to see why you need analytics-driven detection capabilities for true security in the cloud.

Continue Reading

How to Survive the Cybersecurity Talent Gap

With not enough “watchdogs” available to secure IT resources, employers are becoming more innovative, both in recruiting and in using automated solutions.

The shortfall of qualified cybersecurity workers poses an immediate problem and a near-term one for employers. While creative approaches to talent management may address the “pipeline” challenge, an innovative class of security solution is helping to safeguard IT resources today. 

Continue Reading

Plugging the Gaps in SIEMs and Log-Management Systems

Security analysts now have an alternative to drowning in log data.

In a new video, Observable founder and CTO Patrick Crowley explains how the combination of SIEMs (or log-management systems) and endpoint modeling can attack the problem of information overload, for the benefit of those who feel it most sharply: security analysts. 

Continue Reading

Automatic Remediation with Stealthwatch Cloud and AWS

A proof-of-concept approach to automate IP blocking using alerts from our Stealthwatch Cloud service (formerly Observable Cloud)

A blog post that takes a closer look at ways you can prevent a remote IP address from interacting with any of your AWS resources using alerts generated by the Stealthwatch Cloud service (formerly Observable Cloud)

Continue Reading

A Technical Preview of Microsoft Azure’s Network Watcher

A technical preview for configuring Microsoft Azure’s new Network Watcher service for security monitoring.

Microsoft’s Azure team is releasing a new service called Network Watcher, which contains a set of new monitoring tools. This article takes a closer look at the technical details, including ways to configure Network Watcher to improve security monitoring.

Continue Reading

Read our New ebook: “Closing Cloud Security Gaps”

Download this new ebook to see exactly how Observable Cloud addresses security concerns from moving to the cloud.

From CloudTrail to VPC Flow Logs, Amazon Web Services provide great services to enhance visibility within your cloud environment, but operating within the shared responsibility model means that you still have responsibilities. Download the Observable Networks ebook and learn how Observable Cloud, by working in concert with many of your existing AWS security solutions, provides the controls you need to feel confident that you are operating securely in the cloud.

Continue Reading

The Evolution of Cybersecurity in the Cloud [Infographic]

Click on to learn more about the evolution of Cybersecurity in the Cloud.

Continue Reading

Cloud Computing and AWS Transform Data Security (and More)

The third in a three-part series on how to think about security in AWS environments.

Cloud infrastructures such as AWS (Amazon Web Services) encourage rapid change in the companies that use them, according to a new Observable white paper. Cloud attributes including vast amounts of data, fast response, and continual updates may require companies that use AWS to adopt new approaches to data security; but in return, their core operations can be continuously improved. 

Continue Reading