Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

August 2024

Addressing security practitioner burnout: A vital step for security leaders

The “Three Pillars” (people, process, and technology) management framework requires a delicate balance in order to achieve successful operations outcomes. Despite the technology pillar dominating the conversation as of late, cybersecurity practitioners are the backbone of your organization's defense against cyber threats.

Elastic AI Assistant and Attack Discovery integrate with Google Vertex AI to help drive further AI adoption

AI-driven security analytics reduces analyst burnout Most SIEM technologies in today’s market have not kept up with the pace of innovation and place a heavy burden on security analysts to perform manual, labor-intensive tasks in order to maintain defenses. Generative AI is helping security professionals address today’s dynamic threat landscape and prepare for future threats.

Encryption at rest in Elastic Cloud: Bring your own key with Azure Key Vault

In the first blog in this series, we unpacked the foundational concepts of encryption at rest and introduced you to Elastic Cloud’s “bring your own key” (BYOK) feature, which allows you to do encryption at rest with encryption keys managed by the KMS service of your cloud provider. The second blog of this series dives into the technical nuances of implementing encryption at rest with AWS KMS keys.

NEW in Elastic Security 8.15: Automatic Import, Gemini models, and AI Assistant APIs

Elastic Security 8.15 is now available, enhancing our mission to modernize security operations with AI-driven security analytics. Key features include the brand new Automatic Import to streamline data ingestion and onboarding, support for Google’s Gemini 1.5 Pro and Flash large language models (LLMs), a new set of APIs for the Elastic AI Assistant, on-demand file scans for the Elastic Defend integration, and a redesigned way of pivoting between different contexts.

Elastic launches Express Migration program for Splunk customers

Level up to Elastic’s AI-driven security analytics, now with incentives to ease and accelerate your SIEM migration The SIEM is evolving again. Traditional SIEM solutions will be displaced in modern security operations centers (SOCs) by AI-driven security analytics, which uses the power of Search AI to replace largely manual SOC processes with automation.

Encryption at rest in Elastic Cloud: Bring your own key with AWS KMS

In the previous blog of this series, we unpacked the foundational concepts of encryption at rest and introduced you to Elastic Cloud’s “bring your own key” (BYOK) feature, which allows you to do encryption at rest with encryption keys managed by the KMS service of your cloud provider.