Blog

Three Cyberthreats AWS Log Data Doesn't Show You

There are many cyber threats not detected by examining configuration vulnerabilities. Read about the three cyber threats that AWS log data and tools don't show you.

AWS CloudTrail, Amazon CloudWatch and VPC Flow Logs, Amazon Web Services (AWS) automatically indexes network metadata and Amazon Inspector is there to audit virtual server configurations and identify weak spots in applications. However, there are many cyber threats not detected by examining configuration vulnerabilities. Read on to learn about  three cyber threats that AWS log data and tools don't show you.

Continue Reading

IP and Port Scan Alerts

This post will describe how to look at alerts from Observable for network scans, which tends to be harder to judge.


Continue Reading

Anticipate, Defend Security Threats in an AWS Environment

The second in a three-part series on new ways to think about security in AWS environments.

A new Observable whitepaper demonstrates how Amazon Web Services (AWS) provides security in the cloud while still highlighting the challenges that remain for Amazon, its partners, and their customers. This article examines the ways you can anticipate – and combat – the known and unknown threats to security in an AWS environment.

Continue Reading

Static Devices and Detecting Deviations

Observable’s Endpoint Modeling is good at monitoring the “Internet of Things” things. Not only workstations and servers, but printers, phones, cameras, sensors, or industrial devices, and others devices that are found on many networks. It’s possible to identify subtle changes in behavior (that might indicate a compromise) without producing lots of nuisance alerts.

Continue Reading

See us at the Data Connectors Tech Security Conference in Seattle!

Attend Patrick Crowley's discussion about overcoming the gaps traditional security tools with threats found today

We hope to see you at the Seattle Data Connectors Conference where we will be exhibiting. Stop by Patrick Crowley's discussion on how our advanced security solutions overcome the gaps traditional security tools like IDS/IPS and next-gen firewalls leave in the face of today’s threats.

Continue Reading

Observable Networks Achieves Advanced Technology Partner Status in AWS Partner Network

Observable Cloud provides advanced protection for AWS cloud environments

Securing virtual private clouds becomes more critical every day. Observable Networks demonstrates its continuing commitment to that mission by achieving Advanced Technology Partner status in the Amazon Web Services Partner Network (APN).

Continue Reading

The Brave New World of AWS Security | Observable Networks

The first in a three-part series on how to think about security in AWS environments.

Observable’s founder and CTO Patrick Crowley has written a provocative new whitepaper, which analyzes both the achievement of Amazon Web Services (AWS) in assuring security in the cloud, and the challenges that remain for Amazon, its partners, and their customers. 

Continue Reading

Investigating Potential Data Exfiltration with the Observable Web Portal

Observable detects all types of security-related issues, including multiple types of alerts in the “data loss prevention” category. These are aimed at identifying instances when a user (or an attacker) might have transferred files or data outside the local network without authorization. Read this post to learn more.

Continue Reading

Come visit us at the Data Connectors Tech Security Conference this Week in Phoenix!

Attend Patrick Crowley's Discussions About Dynamic Endpoint Modeling

We hope to see you at the Pheonix Data Connectors Conference where we will be exhibiting. Stop by Patrick Crowley's discussion on how the evolving security landscape requires we re-examination tools traditionally used to protect our networks.

Continue Reading

Researching Potential Threats with Observable's Web Portal

Learn what happens when Observable sends you an alert so you will be able to react to it properly. This post describes how to use the Observable web portal to research a set of suspicious connections.

Continue Reading