Flow Logs

Aligning an Organization’s Attack Surface to Detection Surface is Key to Adversary Defense in Today’s Cloud Era
With the Cloud Era, the IT asset estate has expanded, and there is a diverse set of attack surfaces to defend. The term "attack surface" describes the growing IT asset estate, but ...

Netography Uses Labels and Tags to Provide Security Context
Netography today added support for context labels and tagging to a software-as-a-service (SaaS) platform that provides deep packet inspection capabilities to identify cybersecurity threats in near-real-time. Netography CEO Martin Roesch said labels ...
Why VPC Flow Logs Are Critical for Comprehensive Cybersecurity Approaches
VPC (virtual private cloud) flow log data contains a wealth of data that can be utilized to gain a clear understanding of a network’s security posture. However, it can be challenging and ...