Media

CloudTweaks: Cyber-Threats and the Need for Secure Industrial Control Systems

Bryan Doerr describes how even though Industrial Control Systems (ICS) tend to be “out of sight, out of mind,” these systems are essential to life in any advanced society. As these systems are increasingly connected to private and public networks, a new, possibly failure mode is being introduced. Read on to learn how ICS systems - managing crucial infrastructure such as energy, power, water, and transportation - can be attacked by malware.

Continue Reading

CloudTweaks: Can You Afford the Risk of Not Going to the Cloud?

Bryan Doerr discusses the misconception that the cloud is less secure than on-premise deployment or that on-premise security in place is solid. Bryan delves into the fact that public cloud environments are inherently more secure than on-premise, legacy systems. 

Continue Reading

Telecom Ramblings: Industry Spotlight: Observable Networks’ Bryan Doerr on Security

Read this Q&A Interview with Bryan Doerr from Observable on why data center CIOs should not be afraid of the cloud

Continue Reading

SDXCentral: Observable Networks Detects Changes in AWS Lambda Functions

Coverage of the “Observable NetworksReleases Security Support for Amazon Web Services (AWS) Lambda Functions” press release.

Continue Reading

CloudTweaks: Observable Networks Releases Security Support

Coverage of the “Observable Networks Releases Security Support for Amazon Web Services (AWS) Lambda Functions” press release.

Continue Reading

Forbes: SHA-1 Encryption Has Been Broken: Now What?

In February 2017, Google and CWI announced they had broken SHA-1 encryption. Now that SHA-1 is officially broken, read on to learn what encryption and cybersecurity experts will focus on next. Bryan Doerr, a member of the Forbes Technology Council, talks about his prediction for Threat Detection in #5.

Continue Reading

Intellyx: An Intellyx Brain Candy Brief

End-point encryption has caused a major challenge over the last several years when it comes to security. Most edge security approaches rely on deep-packet inspection — something that is no longer possible when those packets are encrypted. The growth of proliferation of IoT and smart devices has resulted in an exponential growth in edge connections, significantly expanding the vulnerability footprint. With this growth, increased security needs and information overload leave most organizations scrambling to respond. Observable Networks uses an approach they call ‘end-point modeling’ to help organizations cut through the noise of alert storms and identify anomalous behavior regardless of packet encryption.

Continue Reading

Data Center Knowledge: Don’t Let Security Misconceptions Cloud Your Judgment

There are cloud service providers that have developed platforms with extensive abilities to monitor, detect, and identify potential threats, and there are third parties rapidly creating advanced security tools to leverage these platforms. Bryan Doerr, Chief Executive Officer for Observable Networks, discusses the security measures what you might already have in place for your on-premise data center and how it might not be enough to prevent and detect security vulnerabilities and threats.

Continue Reading

CloudTweaks: Four Trends and Realities Confronting Security Today

Dr. Patrick Crowley takes a closer look at four emerging technology trends that present new realities and new security challenges. He highlights the security challenges they pose, and describes the new realities security teams must face to overcome them. Endpoint modeling can provide an advantage, both in addressing these concerns and in giving IT and security professionals the right tools they need to improve their security efforts.

Continue Reading

CloudTweaks: Coping with the Internet (Risky) Things

Dr. Patrick Crowley discusses the Internet of Things (IoT) and how, for IT and security professionals are concerned that connecting everyday objects to the public Internet and allowing them to send and receive data could bring threats to organizations. There’s little doubt that the Internet of Things will keep growing in the near future. But there’s reason for hope that a new generation of advanced threat-detection systems will narrow the gap between the threat, and the ability to respond.

Continue Reading