Why Observability Matters For Cybersecurity

Why Observability Matters For Cybersecurity

Imagine you are a cybersecurity incident responder.  Picture it: A developer discovers that the website of one of your subsidiaries has been defaced by a well-known hacking group that targets your industry. The website is running in a Kubernetes cluster. Before...
What is Zero Trust

What is Zero Trust

Zero Trust Architecture (ZTA) is a security concept that assumes that all network traffic is untrusted and must be verified before it can be allowed access to sensitive resources. The traditional approach to cybersecurity, known as the “castle and moat”...
CAN Vehicles be Hacked?

CAN Vehicles be Hacked?

When I was a kid, my grandpa would inevitably fall asleep watching Sunday Afternoon Baseball, leaving time for my cousin and I to sneak a VHS in the VCR while he was unaware. A frequent pick was monster truck rallies. We would then spend the next hour (or until...
Logistics Meets Security

Logistics Meets Security

In light of the drastic increase in cyber attacks, Oteemo decided to look into the Trucking and Logistics spaces and because it has such a large footprint, it also has great potential to incur some very costly incidents.  Fascinated by all the areas for a...