Blog

Vulnerabilities in Sensor Appliances that Perform Payload Inspection

Google's Project Zero blog has an excellent post about exploiting a vulnerability in a network sensor appliance. I recommend reading the whole thing, but here is a brief summary...

Continue Reading

AWS Lambda for Flow Logs Processing

Learn how to create a function to process data delivered by Amazon Kinesis using VPC flow log data.

Continue Reading

The VTech Data Breach and the Internet of Things

The latest example of a security data breach is almost as bad as the idea of thieves stealing toys before the holidays. Or could it be worse? Learn how the Internet of Things and a lack of security experience led to a significant data breach at a leading digital toymaker.

Continue Reading

VPC Flow Log Architecture

A closer look at the process related to using VPC Flow Logs for passive monitoring of network traffic in Amazon Web Services virtual private clouds, including a focus on the underlying architecture.

Continue Reading

Wearable Technology and Security – Too Soon to Be Worrying?

Wearable devices are one of the fastest-growing sectors in technology. As smart watches, fitness trackers, and other devices increasingly “walk into” the enterprise and seek to be connected, what should IT and security professionals be doing?

Continue Reading

Dynamic Endpoint Modeling Now Listed in the AWS Marketplace

Observable Networks’ Dynamic Endpoint Modeling solution is now officially part of the AWS Marketplace. Learn more about this exciting new development.

Continue Reading

Fit to be Tied? Fitness Tracking Device Presents Unexpected Malware Risk

A recently uncovered malware vulnerability may mean that FitBit tracking devices are highly susceptible to attack. What should you do to protect the health and fitness of your network?

Continue Reading

Three Tech Trends that Make Endpoint Modeling Essential

Three industry-wide trends are making endpoint modeling an essential complement to the traditional security stack. It’s time to plug the holes left open by conventional security solutions. Firewalls, antivirus, and malware removal are still necessary but not sufficient to keep IT systems and data secure.

Continue Reading

Amazon Web Services Demos Observable’s Dynamic Endpoint Modeling at re:Invent 2015

AWS recently featured Observable Networks and our Dynamic Endpoint Modeling solution in a presentation on using VPC flow logs to monitor endpoint behaviors. Learn more and view the presentation from AWS re:Invent now.

Continue Reading

Are Multi-function Devices a Security Risk in Your Workplace?

No doubt your employees enjoy the benefits of networked multi-function printers (MFPs). But has your organization considered how big a threat these devices could pose to your information security? Here’s a hint: It could be more of a risk than an employee’s laptop.

Continue Reading