Netography Fusion recently added support for Microsoft Azure Virtual Network (VNet) flow logs, a new feature in Azure Network Watcher, making it easier for you to use Fusion to detect anomalous activity like East/West movement…
During my career in security and network operations, I’ve had the opportunity to be part of the due diligence process in several mergers and acquisitions. Now, as a sales engineer at Netography, I am working…
“The scariest thing in the world is a developer with a credit card” -CISO, F500 FinTech. VPCs and VNets spinning up without the knowledge of SecOps, NetOps, or CloudOps teams can give CISOs nightmares. All…
Security organizations have long faced challenges with deployment of security infrastructure that provides detection of attacks and attackers when performing initial configuration, tuning, and ongoing curation. It is resource-intensive to get a toolset to productivity,…
If you’ve been part of a network segmentation or Zero Trust architecture planning project or a data center or application migration initiative, the following scenario probably rings true.
As enterprises embrace a multi-cloud strategy, the top use case is apps siloed on different clouds which increased to 57%, up from 44% last year. So, when it comes to cloud security, it makes sense…
Netography recently released a new collection of capabilities for detecting attacks on the Kerberos protocol that are often launched against Windows domains during network intrusions. Some of these attacks are difficult to detect with log…
Organizations have moved to multi-cloud environments to achieve the benefits of business resilience, agility, best-of-breed capabilities, compliance, and cost containment, or due to the result of a merger or acquisition. But distributed environments also introduce…
Last week, Rockwell Automation issued an urgent message to customers urging them to “take immediate action” to disconnect any Rockwell ICS devices exposed to the internet. Rockwell issued this notice due to “heightened geopolitical tensions…
The concept of a Zero Trust Architecture (ZTA) is pretty simple – trust no one, verify everyone. No user or device should be trusted automatically, even if they are connected to a permissioned environment or…
Remember the old saying: “You can’t protect what you can’t see”? When I started preaching about it as part of the marketing launch for Real-time Network Awareness (RNA) it seemed pretty obvious that we needed…
Like many of you, I’ve been sucked into the Yellowstone series. Having grown up and lived my entire life in a congested corner of Massachusetts, the series may as well have taken place on the…