Security in the Cloud – Responding to AWS Threats in Real Time

A use case example shows just how endpoint modeling improves security in AWS environments or public clouds.

In part two of our series on security in the cloud, we provide an example of how adding endpoint modeling to a company’s cloud security strategy enables an IT professional to improve security in an AWS cloud and respond to threats in real time. 

Continue Reading

“Payload Detonators”: Understanding Security Sandbox Risks

Endpoint modeling represents a less explosive alternative.

When in doubt, blow it up? That seems to be the latest theory in data encryption as network security sandboxes, or “payload detonators,” are growing in popularity as one way to expose potential malware in network traffic. However, do security professionals understand the dependencies inherent to these devices? Are the extra complications worth it?

Continue Reading

Securing Your Data in the Cloud – Are You Ready for the Challenge?

The first in a two-part series on the security challenges that the cloud poses for your cloud assets, and how you can use Observable solutions to meet them.

The worldwide migration of IT resources to the cloud continues at a rapid pace, but the effort to secure all of those cloud-resident services, applications, and data lags behind. In this first of a two-part series, we look at the unique challenges that make security within a cloud difficult, and point to some promising new solutions. 

Continue Reading

Practice Makes Protection: “Hacking” Yourself into Better Security

Valuable resources to learn more about the “hack yourself” movement – critical for improving security.

Cops and robbers. Cowboys and Indians. White hats versus black hats. The games we played as kids are not unlike the work we do as IT professionals fending off cyber criminals. And while security is serious business, “hack yourself” programs harken back to these youthful adventures with simulated exercises designed to strengthen skills and defenses.

Continue Reading

Automated Observable Setup for AWS Users

Automatically provision your AWS accounts with a new tool

Learn how easy it can be to set up Observable monitoring for an AWS account. Learn the steps here.

Continue Reading

Piecing Together the “Big Hack”

What would it take to debilitate a major American city?

A fictional account of a coordinated cyberattack, no matter how dramatic, is still fictional. But the smaller attacks that could make up a larger one are grounded in reality, and deserve close attention. 

Continue Reading

Five Steps You Can Take to Reduce a Hackers’ Advantage

Thinking like a hacker may help you prevent a future attack.

Sometimes in order to beat a hacker, you have to think like a hacker. That’s the secret behind continuous security validation, an emerging trend among security organizations that are susceptible to high-profile breaches. Learn the five steps to taking advantage away from the hackers and reducing your risk proactively.

Continue Reading

Ransomware Meets Remote Server Tracking and Sentinel Files

Enterprising administrators came up with the idea of putting "canary" or "sentinel" files out on their shared drives.

For organizations ransomware isn't just a particularly annoying type of malware. It's somewhat inconvenient when a user loses access to the files on an infected drive, but it's unspeakably horrible when all users lose access to the files on a network share. Some enterprising administrators came up with the idea of putting "canary" or "sentinel" files out on their shared drives. These are files that normal users would have no reason to access and whose contents are known to a monitoring system.

Continue Reading

A Closer Look at the Recently Exposed Mitsubishi Outlander Hack

A white hat hacker identifies another security flaw in automotive design.

Did you recently purchase a new vehicle? Is it wirelessly networked? If so you need to be paying attention as criminals are now targeting networked automobiles. Find out how, and why the Mitsubishi Outlander is the latest car to have a vulnerability exposed.

Continue Reading

What We Can Learn from the Biggest Data Breaches of 2016 (So Far)

Understanding these attacks may help you improve security in the future.

It has already been a busy year for IT professionals and the cyber criminals they are forced to defend their companies against every day. Find out what has made the news thus far in 2016, including rising malware incidents, blackouts, and more vulnerabilities in SSL.

Continue Reading