Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Phases of the Digital Forensics Investigation Process

Investigating a security event is the less glamorous version of an episode of CSI: Crime Scene Investigation. Without the snazzy, high-end, mostly-fictitious technology that television shows you, your actual digital forensics investigation usually involves an arduous process of reviewing technical data and looking for the breadcrumbs a malicious actor left behind.

Fortifying data security: 5 features your data store must have

In an era where data is often referred to as the “new oil,” the importance of data security can't be overstated. Breaches can lead to financial losses, reputational damage, and lost trust among customers and stakeholders. One primary step toward mitigating security risks is choosing a data store that has been designed with a robust security framework.

How To Complete a Cybersecurity Investigation Faster

Despite implementing cybersecurity administrative and technical risk mitigation control, companies still experience cybersecurity incidents and data breaches. Not every security incident ends with data exfiltration. An organization that can contain the attacker early in the kill chain can prevent data loss and reduce the incident’s impact.

Elastic and AWS - Securing the cloud, together

Elastic is pleased to announce that we have recently achieved the AWS Security Independent Software Vendor (ISV) Competency Partner status with specialization in Threat and Detection Response (SIEM, SOAR, and XDR). This recognition highlights our commitment to providing you, our customers, with advanced security capabilities that can help you protect your sensitive data and applications in the cloud.

4 SIEM Augmentation Tools and Why You Need Them

Security information and event management (SIEM) tools do a huge amount of security heavy lifting. A central record of millions of events, security operation centres (SOCs) rely on SIEMs for everything from compliance to threat detection and response. But as anyone who has ever worked in a SOC will testify, SIEMs have blindspots and problems—lots of them (Read our Head of Technology, Brad Freeman’s account of using a SIEM).

DevSecOps and log analysis: improving application security

More and more organizations are abandoning the outdated waterfall development methodology for more practical and efficient Agile development practices. As this movement has occurred, development teams are moving faster than ever by employing Continuous Integration (CI) and Continuous Deployment (CD) practices that are serving to shorten development cycles and get new features into production faster. This does, however, come with greater security risk in some respects.

Elastic Security 8.8: Powerful endpoint response, alert triage, and data accuracy to bring more efficiency to security

As the volume and complexity of cyber threats continue to increase, security analysts face mounting pressure to protect their organizations from attack with maximum efficiency. Elastic Security 8.8 introduces features designed to help analysts digest, prioritize, and quickly respond to security incidents. These features include the following: Elastic Security 8.8 is available on Elastic Cloud — the only hosted Elasticsearch offering to include all of the new features in this latest release.

AI on offense: Can ChatGPT be used for cyberattacks?

Generative AI models have a long history in artificial intelligence (AI). It all started back in the 1950s with Hidden Markov Models and Gaussian Mixture Models, and it really evolved with the advent of Deep Learning. In the past five years alone, we have gone from models with several millions of parameters to the latest being GPT-4, estimated to have over 100 trillion parameters.

Reliability and security best practices for financial services in ANZ

Every year, Australians lose over $6 billion due to financial fraud and cybercrime , so it is great to see the collaboration between banks in Australia to fight fraudsters head-on with the help of the Fraud Reporting Exchange (FRX ). The FRX is a trusted, secure, single platform providing timely and efficient means of reporting and actioning fraudulent (including scam) activities between banks.

UTMStack Unveils Ground-breaking Artificial Intelligence to Revolutionize Cybersecurity Operations

Doral, Florida UTMStack, a leading innovator in cybersecurity solutions, has announced a significant breakthrough in the field of cybersecurity – an Artificial Intelligence (AI) system that performs the job of a security analyst, promising to transform cybersecurity practices forever.