Syndicated Blog

Netography
Security for the Atomized Network

Yellowstone Ranch 2.0: Protecting Your Multi-cloud and Hybrid “Herd” with Trust Boundaries

| | Blog
Like many of you, I’ve been sucked into the Yellowstone series. Having grown up and lived my entire life in a congested corner of Massachusetts, the series may as well have taken ...

Longtime Security Industry Leader Art Coviello Joins Netography Board of Director

Netography®, the security company for the Atomized Network, today announced that Art Coviello joined the company as its newest Board Member. Coviello brings over 25 years of cybersecurity operational experience to the ...

How to Close the Visibility Gaps Across Your Multi-Cloud Environment

| | Blog
Nearly 90% of organizations have a multi-cloud environment today. However, those environments create operational challenges for teams that are responsible for ensuring availability and maintaining compliance with policies. Too often operations teams ...

Getting to High-Fidelity Detections Faster with Context Creation Models

| | Blog
In this new blog, James Pittman describes how dynamic context creation models in Netograpy Fusion use attributes from your tech stack to generate high fidelity detections that reduce alert overload. The post ...

The Need for East-West Observability to Protect Against Compromised IAM

| | Blog
In his new blog, Martin Roesch describes how leveraging an immutable source of truth you can trust – your network – provides East-West observability to get ahead of attackers when your IAM ...

The SOC 2 Effect: Elevating Security and Trust in Netography Fusion

| | Blog
An insider’s view of some important lessons learned during Netography’s journey to achieve SOC 2 compliance and its benefits to our customers. The post The SOC 2 Effect: Elevating Security and Trust ...

Don’t Misdefine Network Security in 2024: Include On-Prem and Cloud

| | Blog
Cloud networks contain valuable security information, but without a way to gather and analyze that data, you are missing out on a comprehensive view of what’s happening and what should never occur ...

A CISO Explains: How Netography Defends Critical Infrastructure

| | Blog
Read the recap of our online discussion with Jason Waits, CISO at Inductive Automation. He explains how his security team used the Netography Fusion® Network Defense Platform (NDP) to advance his network ...

Netography Fusion Expands Microsoft Integrations for Greater Context Enrichment and Faster Compromise Detection

| | Blog
Netography Fusion adds Microsoft Defender for Endpoint and Microsoft Defender XDR integrations, enabling customers with faster detection of and response to compromises with context from Microsoft-managed identities, email, endpoints, and cloud apps ...

Why It’s Time to Evolve from Threat-centric to Compromise-centric Security

| | Blog
In his new blog, Martin Roesch explains why we all need to change our focus when we think about detections, and evolve from threat-centric to compromise-centric approaches. The post Why It’s Time ...