Register now for our webinar recording, “Endpoint Modeling: A Critical New Component in Network Security.” Featuring Ichthys IT services, this webinar provides real-world insight into endpoint modeling and how this technology can identify and defeat advanced threats.Continue Reading
Observable’s Dynamic Endpoint Modeling solution can now use VPC Flow Logs to effectively monitor network activity across virtual servers on Amazon Web Services (AWS).Continue Reading
Owners of small and mid-sized businesses increasingly turn to managed service providers (MSPs) to protect their systems, and their customers, from data breaches. What should MSPs who want to seize this opportunity be doing?Continue Reading
Employee error is the Achilles heel of even the best-laid plans to safeguard an organization’s data. It takes a hundred different forms, and all of them can be taken advantage of by hackers. What’s an IT or security professional to do?
In one weekend, two prominent security software products are shown to contain zero-day flaws that may be exploitable by hackers. We look at why the conventional “security stack” is not enough.
Remember the experiment where a team was able to hack into a vehicle and take over its controls? Learn how this was possible – from the hacker himself.Continue Reading
It’s an important question every IT organization must ask: Should I allow employees to use USB personal devices? We explore the reasons why USB devices are a top threat, starting with the difficulty in managing them, and why patches and usage rules are not enough.Continue Reading
A recent combination of hacking and insider trading gave some traders an unfair advantage. In this case, their persistence paid off, but learn what you can do to gain the upper hand.Continue Reading
Observable Networks develops the Python Programing Language module "flowlogs-reader" for reading and manipulating AWS VPC Flow Logs.Continue Reading