Security organizations have long faced challenges with deployment of security infrastructure that provides detection of attacks and attackers when performing initial configuration, tuning, and ongoing curation. It is resource-intensive to get a toolset to productivity,…
If you’ve been part of a network segmentation or Zero Trust architecture planning project or a data center or application migration initiative, the following scenario probably rings true.
As enterprises embrace a multi-cloud strategy, the top use case is apps siloed on different clouds which increased to 57%, up from 44% last year. So, when it comes to cloud security, it makes sense…
Netography recently released a new collection of capabilities for detecting attacks on the Kerberos protocol that are often launched against Windows domains during network intrusions. Some of these attacks are difficult to detect with log…
Organizations have moved to multi-cloud environments to achieve the benefits of business resilience, agility, best-of-breed capabilities, compliance, and cost containment, or due to the result of a merger or acquisition. But distributed environments also introduce…
Last week, Rockwell Automation issued an urgent message to customers urging them to “take immediate action” to disconnect any Rockwell ICS devices exposed to the internet. Rockwell issued this notice due to “heightened geopolitical tensions…
The concept of a Zero Trust Architecture (ZTA) is pretty simple – trust no one, verify everyone. No user or device should be trusted automatically, even if they are connected to a permissioned environment or…
Remember the old saying: “You can’t protect what you can’t see”? When I started preaching about it as part of the marketing launch for Real-time Network Awareness (RNA) it seemed pretty obvious that we needed…
Like many of you, I’ve been sucked into the Yellowstone series. Having grown up and lived my entire life in a congested corner of Massachusetts, the series may as well have taken place on the…
Nearly 90% of organizations have a multi-cloud environment today. However, those environments create operational challenges for teams that are responsible for ensuring availability and maintaining compliance with policies. Too often operations teams lack the oversight…
In this new blog, James Pittman describes how dynamic context creation models in Netograpy Fusion use attributes from your tech stack to generate high fidelity detections that reduce alert overload.
In his new blog, Martin Roesch describes how leveraging an immutable source of truth you can trust – your network – provides East-West observability to get ahead of attackers when your IAM has been subverted…