May 25, 2023
|
By Caitlin Betz,
As the volume and complexity of cyber threats continue to increase, security analysts face mounting pressure to protect their organizations from attack with maximum efficiency. Elastic Security 8.8 introduces features designed to help analysts digest, prioritize, and quickly respond to security incidents. These features include the following: Elastic Security 8.8 is available on Elastic Cloud — the only hosted Elasticsearch offering to include all of the new features in this latest release.
May 24, 2023
|
By Apoorva Joshi,
Generative AI models have a long history in artificial intelligence (AI). It all started back in the 1950s with Hidden Markov Models and Gaussian Mixture Models, and it really evolved with the advent of Deep Learning. In the past five years alone, we have gone from models with several millions of parameters to the latest being GPT-4, estimated to have over 100 trillion parameters.
May 11, 2023
|
By John Uhlmann
I often see “EDR” used as a synonym for “industry-leading endpoint security solution.” There are times when this is accurate, but there are also times when I believe that this generalization stymies discourse around current capability gaps in the endpoint security ecosystem. In this blog post, I want to share my personal taxonomy for endpoint security products — albeit one that perhaps confusingly reuses existing terminology.
May 4, 2023
|
By Abdelwahhab Satta, Octodet,
Industrial control systems (ICS) have historically been isolated and less interconnected. Isolation was one of the things that kept these systems more secure behind air gaps, at the cost of lost coordination and collaboration. This is rapidly changing with the rise of Industry 4.0 with increased interconnectivity and integration of smart technologies like Industrial IoT (IIoT) and cloud computing in modern industrial processes.
Apr 28, 2023
|
By Kseniia Ignatovych,
Elastic Security now comes with 1,100+ prebuilt detection rules for Elastic Security users to set up and get their detections and security monitoring going as soon as possible. Of these 1,100+ rules, more than 760 are SIEM detection rules considering multiple log-sources — with the rest running on endpoints utilizing Elastic Security for Endpoint.
Apr 24, 2023
|
By Sean Torassa
For state and tribal governments thinking about applying for — or that have already applied for — funding from the US federal State and Local Cybersecurity Grant Program (SLCGP) or Tribal Cybersecurity Grant Program (TCGP), you likely already know that building out a comprehensive cybersecurity plan is a required element in the process.
Apr 21, 2023
|
By Marvin Ngoma
Security teams today need to analyze vast amounts of data from various sources, including endpoints, cloud, applications, and user activity, just to mention a few. At the same time, adversary activity is also on the rise and the threat landscape is becoming more and more complex every day. Further exacerbating the situation, security teams are strapped for resources and unable to analyze the enormous amounts of data and security alerts they receive in real time.
Apr 19, 2023
|
By Daniel Rohan
Containers and microservices have changed the game: They allow organizations to ship apps faster and make better use of hardware. They encourage modular software design. And containers help teams embrace the cloud-native paradigms of scalability, mobility, and resilience. It’s safe to say that containers have shaken things up.
Apr 5, 2023
|
By Sneha Sachidananda
It's no surprise that organizations are moving to the cloud to innovate — to meet the growing demands of their customers and digital transformation. Organizations want to build applications that are fast and scalable. They want to make use of the latest cloud-native capabilities like containers, orchestrators, microservices, APIs, and declarative infrastructure. However, this also means security in the cloud cannot be an afterthought.
Apr 4, 2023
|
By Brandon Mavleos
The efficiency, security, and scalability of cloud operations are driving financial institutions’ adoption of the technology faster than ever before. The ability to meet customers where they want to transact, personalize solutions, and leverage new data and analytics solutions (including AI) on-demand is driving this growth. In fact, according to Accenture, the banking industry's workloads in the cloud more than doubled from 2021 to 2022.
May 25, 2023
|
By Elastic
In Q4 of 2022 there were more than 6,000 new CVE Records published. This begs the question: how susceptible are you to the latest vulnerabilities? Learn how one of Elastic’s new capabilities: cloud security posture management can help you modernize your cloud security operations.
May 4, 2023
|
By Elastic
99% of cloud failures are due to mistakes like misconfiguration. This begs the question: Are your cloud workloads configured correctly? Learn how cloud security posture management, one of Elastic’s new capabilities, can help you modernize your cloud security operations.
May 4, 2023
|
By Elastic
95% of workloads will be deployed on cloud-native platforms by 2025. This begs the question: are your cloud workloads truly secure? Learn how cloud workload protection, one of Elastic’s new capabilities, can help you modernize your cloud security operations.
Oct 17, 2022
|
By Elastic
Use Elasticsearch and Agent to protect all of your endpoints and take action when malicious actors threaten your environment.
Sep 28, 2022
|
By Elastic
Elastic Security equips analysts to solve their most pressing infosec problems by preventing, detecting, and responding to threats quickly and at scale.
Jul 7, 2022
|
By Elastic
Join James Spiteri, PMM Director for Elastic Security, as he walks through an entire incident response scenario using several features of the Elastic Search platform including Security features such as SIEM, Endpoint Security, osquery, correlation and case management. Observability features such as logging and APM are also covered as part of this investigative workflow. Additional References.
Dec 9, 2021
|
By Elastic
Elastic Security has introduced the industry’s only free and open Limitless XDR solution. Now, native endpoint security comes on every host, automated detections prioritize the biggest risks, and universal data ingestion and centralized analysis accelerate analyst workflows across triage, investigation, escalation, and response. Join our keynote session to learn what unrestricted data ingestion, visibility, and analysis means for analysts, the impacts that key technology and cloud integrations have on security teams, and what the future with Limitless XDR looks like for organizations worldwide.
Dec 9, 2021
|
By Elastic
In this session, you'll learn how to make sense of Microsoft 365 and Azure AD logs to secure and monitor your environment. Speaker: Eric Ooi, Director of Security and Research, Iron Vine Security
Nov 4, 2021
|
By Elastic
Elastic Security equips analysts to solve their most pressing infosec problems by preventing, detecting, and responding to threats quickly and at scale.
Jul 14, 2021
|
By Elastic
Learn how to use Elastic Security’s ransomware protection to stop threats at scale. In this tutorial, you will learn how to enable ransomware protection through Elastic Security and how our technology uses behaviors — not signatures — to protect your network.
- May 2023 (7)
- April 2023 (8)
- March 2023 (2)
- February 2023 (5)
- January 2023 (2)
- December 2022 (4)
- November 2022 (7)
- October 2022 (9)
- September 2022 (5)
- August 2022 (4)
- July 2022 (2)
- June 2022 (6)
- May 2022 (6)
- April 2022 (6)
- March 2022 (7)
- February 2022 (2)
- January 2022 (6)
- December 2021 (10)
- November 2021 (1)
- October 2021 (1)
- September 2021 (2)
- August 2021 (8)
- July 2021 (9)
- June 2021 (9)
- May 2021 (3)
- April 2021 (2)
- March 2021 (6)
- February 2021 (3)
- January 2021 (2)
- December 2020 (4)
- October 2020 (1)
- August 2020 (8)
- July 2020 (8)
- June 2020 (7)
- May 2020 (2)
- April 2020 (7)
- March 2020 (4)
- February 2020 (4)
- January 2020 (5)
Elastic is the world's leading software provider for making structured and unstructured data usable in real time for search, logging, security, and analytics use cases. Built on an open source foundation, the Elastic Stack lets you reliably and securely take data from any source, in any format, and search, analyze, and visualize it in real time.
The Elastic Stack:
- Kibana gives shape to your data and is the extensible user interface for configuring and managing all aspects of the Elastic Stack.
- Elasticsearch is a distributed, JSON-based search and analytics engine designed for horizontal scalability, maximum reliability, and easy management.
- Beats is a platform for lightweight shippers that send data from edge machines to Logstash and Elasticsearch.
- Logstash is a dynamic data collection pipeline with an extensible plugin ecosystem and strong Elasticsearch synergy.
Founded in 2012 by the people behind the Elasticsearch, Kibana, Beats, and Logstash open source projects, Elastic's global community has more than 80,000 members across 45 countries. Since its initial release, Elastic's products have achieved more than 100 million cumulative downloads.