Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Privacy Risk Management Across the Data Lifecycle

As a kid, keeping a secret meant not telling anyone else information that a friend chose to share with you and trusted you to protect. In the digital era, protecting customer and employee sensitive data works similarly. Although establishing privacy controls and maintaining data protection are more difficult when managing complex IT environments, the principles underlying your data protection initiatives remain the same.

How does Elastic Security drive value to your organization?

Introducing the new Elastic Security Value Calculator. With this tool, you can quickly quantify the financial efficiencies Elastic® can deliver for your organization. Estimate Elastic's value to your organization. Visualize how Elastic Security improves KPIs around risk, costs, and productivity. The numbers tell the story: achieving holistic visibility reduces risk, improves productivity, and drives cost savings and revenue recovery.

A Guide to Digital Forensics and Incident Response (DFIR)

When you engage in a security incident investigation, you need to quickly sift through vast quantities of data. In that moment, tracking your attacker, containing the attack, and identifying the root cause are the activities that matter most. However, in an attack’s aftermath, the digital recovery process and post-incident paperwork becomes your new nightmare.

Responding to remote service appliance vulnerabilities with Sumo Logic

For those responsible directly or indirectly for the cyber defense of their organizations, June 2023 is proving to be an extremely challenging month. In this month alone, vulnerabilities were discovered in various appliances, ranging from CVE-2023-27997 impacting FortiGate devices to CVE-2023-35708 impacting MOVEit Transfer software as well as the exploitation activity discovered of Barracuda appliances via CVE-2023-2868.

Top 5 SIEM Use Cases CrowdStrike Falcon LogScale Solves Today

SIEMs play a crucial role in the modern SOC: They allow you to collect, correlate and analyze log data and alerts for security and compliance. Yet, despite their value, SIEMs have struggled to keep up with today’s logging performance and scalability requirements. Given that adversaries are operating faster than ever, organizations must prioritize the capabilities that help them identify and respond to threats quickly.

Transforming defence with Elastic AI and data capabilities

What a time it is for data and the UK Ministry of Defence (MoD), with large language models (LLMs) and artificial intelligence (AI) innovation accelerating at unprecedented speed. How quickly can the MoD take operational advantage of these advancements? Now is the time to unleash the power of data and transform how the MoD approaches cybersecurity to outpace adversaries, gain multi-domain operational efficiency, and of course, attain rapid decision-making superiority.

How to remove PII from your Elastic data in 3 easy steps

Personally identifiable information (PII) compliance is an ever-increasing challenge for any organization. Whether you’re in ecommerce, banking, healthcare, or other fields where data is sensitive, PII may inadvertently be captured and stored. Having structured logs enables quick identification, removal, and protection of sensitive data fields easily; but what about unstructured messages? Or perhaps call center transcriptions?

5 Best Practices for Building a Cyber Incident Response Plan

You’ve probably heard the Boy Scout motto, “be prepared.” In his 1908 handbook, Scouting for Boys, the author explained, “it shows you how you must be prepared for what is possible, not only what is probable.” Your cyber incident response plan is how you prepare for a possible, and, also in today’s world, probable security incident or data breach. Unfortunately, since every organization is different, no single plan will work for everyone.

A modern SIEM for whole-of-state cybersecurity

US state and local government agencies continue to contend with a dizzyingly complex IT environment, which includes data silos, tool sprawl, rising cyber threats, and limited availability of cybersecurity experts. In response, many state CISOs are exploring a “whole-of-state” cybersecurity strategy, which aims to bolster their state’s security through centralization and collaboration.

CISOs and cybersecurity in an economic downturn: do more with less

The financial outlook for the rest of 2023 and 2024 is far from cheery, and economic uncertainty is affecting everyone and everything, including the cybersecurity sector. Security budget cuts or freezes are the course many organizations are tempted to take in this financially precarious situation. Conservative spending is a natural response to the present economic downturn and a possible recession knocking on our doors, implying fewer clients, lower profits, and higher costs.