Blog

A Closer Look at Observable Networks’ Sensor Appliance

In the interest of transparency, we've always published the source of ONA's IP traffic metadata collection software. To further that interest, we're now pleased to publish the source for all of the ONA's functions. You can review this code at the ONA's GitHub project page.

Continue Reading

Don’t Miss Our Upcoming Webinar: “Endpoint Modeling: A Critical New Component in Network Security”

Register now for our webinar recording, “Endpoint Modeling: A Critical New Component in Network Security.” Featuring Ichthys IT services, this webinar provides real-world insight into endpoint modeling and how this technology can identify and defeat advanced threats.

Continue Reading

Observable Launches AWS Network Monitoring

Observable’s Dynamic Endpoint Modeling solution can now use VPC Flow Logs to effectively monitor network activity across virtual servers on Amazon Web Services (AWS).

Continue Reading

Best Practices for Improving MSP Client Security

Owners of small and mid-sized businesses increasingly turn to managed service providers (MSPs) to protect their systems, and their customers, from data breaches. What should MSPs who want to seize this opportunity be doing?

Continue Reading

Employee Error and Security: How to Contain the X-Factor

Employee error is the Achilles heel of even the best-laid plans to safeguard an organization’s data. It takes a hundred different forms, and all of them can be taken advantage of by hackers. What’s an IT or security professional to do?

Continue Reading

Kaspersky and FireEye Zero-Day Vulnerabilities

Who Is Watching the Watchers?

In one weekend, two prominent security software products are shown to contain zero-day flaws that may be exploitable by hackers. We look at why the conventional “security stack” is not enough.

Continue Reading

Charlie Miller on the Fiat Chrysler Hack

Remember the experiment where a team was able to hack into a vehicle and take over its controls? Learn how this was possible – from the hacker himself.

Continue Reading

USB Security: How Do I Protect My Organization from Threats?

It’s an important question every IT organization must ask: Should I allow employees to use USB personal devices? We explore the reasons why USB devices are a top threat, starting with the difficulty in managing them, and why patches and usage rules are not enough.

Continue Reading

How Ukrainian Hackers (Temporarily) Beat Wall Street

A recent combination of hacking and insider trading gave some traders an unfair advantage. In this case, their persistence paid off, but learn what you can do to gain the upper hand.

Continue Reading

Open-Source AWS VPC Flow Logs Analysis Module for Python

Observable Networks develops the Python Programing Language module "flowlogs-reader" for reading and manipulating AWS VPC Flow Logs.

Continue Reading