AI-Enhanced Attacks Accelerate the Need for Hybrid, Multi-Cloud Network Security and Observability

| | Blog
Gartner forecasts generative AI will be used in 17% of cyberattacks within the next two years. This is not surprising, given that we already see examples of threat actors using AI for their operations. The initial use case involves leveraging AI to simplify access to an environment. The post AI-Enhanced ... Read More

3 Reasons Why Compromise Detection is a Cyber Resilience Game Changer

| | Blog
The big opportunity you have as a startup is to change the way that people think and solve really hard problems. It’s an exciting challenge and what’s driven me throughout my career.  The post 3 Reasons Why Compromise Detection is a Cyber Resilience Game Changer appeared first on Netography ... Read More

Mining for Gold: Flow Logs as a Security Resource

| | Blog
The big opportunity you have as a startup is to change the way that people think and solve really hard problems. It’s an exciting challenge and what’s driven me throughout my career.  The post Mining for Gold: Flow Logs as a Security Resource appeared first on Netography ... Read More

Mining for Gold: Flow Logs as a Security Resource

| | Blog
The big opportunity you have as a startup is to change the way that people think and solve really hard problems. It’s an exciting challenge and what’s driven me throughout my career.  The post Mining for Gold: Flow Logs as a Security Resource appeared first on Netography ... Read More

More Signal, Fewer Resources: The Value of Context-Enriched Metadata

| | Blog
Security organizations have long faced challenges with deployment of security infrastructure that provides detection of attacks and attackers when performing initial configuration, tuning, and ongoing curation. It is resource-intensive to get a toolset to productivity, providing relevant alerting that is contextually meaningful in their environment. Efficiency in detection infrastructure can ... Read More
™

The Forgotten Need for Network Observability in the Rush to Migrate to the Cloud

| | Blog
As enterprises embrace a multi-cloud strategy, the top use case is apps siloed on different clouds which increased to 57%, up from 44% last year. So, when it comes to cloud security, it makes sense for enterprises to focus on app security right away. The post The Forgotten Need for ... Read More
™

“You Can’t Protect What You Can’t See” Still Rings True. Why Observability Now.

| | Blog
Remember the old saying: “You can’t protect what you can’t see”? When I started preaching about it as part of the marketing launch for Real-time Network Awareness (RNA) it seemed pretty obvious that we needed more visibility in order to protect our environments more effectively. But in the intervening years, ... Read More
™

“You Can’t Protect What You Can’t See” Still Rings True. Why Observability Now.

| | Blog
Remember the old saying: “You can’t protect what you can’t see”? When I started preaching about it as part of the marketing launch for Real-time Network Awareness (RNA) it seemed pretty obvious that we needed more visibility in order to protect our environments more effectively. But in the intervening years, ... Read More

How to Close the Visibility Gaps Across Your Multi-Cloud Environment

| | Blog
Nearly 90% of organizations have a multi-cloud environment today. However, those environments create operational challenges for teams that are responsible for ensuring availability and maintaining compliance with policies. Too often operations teams lack the oversight they need in real-time to make sure that asset and workload activity across multi-clouds is ... Read More

The Need for East-West Observability to Protect Against Compromised IAM

| | Blog
In his new blog, Martin Roesch describes how leveraging an immutable source of truth you can trust – your network – provides East-West observability to get ahead of attackers when your IAM has been subverted and user accounts taken over The post The Need for East-West Observability to Protect Against ... Read More
Loading...