Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Data compliance in public sector: Making data secure and accessible isn't mutually exclusive

In the UK, the Information Commissioner’s Office (ICO) has the responsibility of upholding information rights in the public interest. The ICO work with businesses and public sector organisations to offer guidance and best practices for using data and information responsibly, as well as regulating and enforcing relevant laws.

Leveling up Elastic Cloud security: Introduction to role-based access control

Did you know that you can assign roles to users to implement fine-grained control for your Elastic® Cloud organization and deployments? Role-based access control (RBAC) is a cloud security best practice that is considered a standard feature in enterprise software, as it provides a structured way to manage access to cloud resources. Within an RBAC framework, roles are a vital construct for grouping, organizing, and delegating permissions to different users.

What's new in Elastic Security 8.10: Scale your defenses and outpace attackers

Richer alert contextualization, generative AI in GA, ATT&CK® coverage view, cloud security posture management (CSPM) for Google Cloud, and automated CSPM onboarding for AWS accounts Elastic Security brings a MITRE ATT&CK®-aligned detection coverage view, richer alert contextualization, and extended cloud security posture management (CSPM) to Google Cloud Platform (GCP).

7 tech challenges that can be collaboration opportunities for global governments

From cybersecurity to AI to legacy IT, agencies are united by similar obstacles So far the twenty-first century has unleashed a torrent of technological innovations, becoming a double-edged sword for governments worldwide. The growing burden of legacy IT systems, cybersecurity threats, AI incorporation, data privacy concerns, budgetary constraints, and shifting geopolitical landscapes puts governments at the forefront of a rapidly evolving environment.

10 rules for security leadership

I have worked as a security leader since the early commercial days of the internet, where the CISO role only existed in some areas of financial services. Participating in the growth and maturity of security as a business function has been an amazing journey. I have learned a lot of lessons on my own, through my personal experiences, or via my peers. One thing I was not able to do was learn from experienced CISOs that have time and distance to reflect on how to best be successful as a CISO.

Why cybersecurity is a perfect storm for the public sector

In 1991, a weather system formed off the east coast of the United States with a cold front that created a low pressure ridge to the east of Nova Scotia. At the same time, a high-pressure system extending out from the Appalachian Mountains forced the ridge first southeast and then to the west, where it encountered the remnants of Hurricane Grace, which it promptly absorbed and swelled in size as it did so.

Automating insight into SEC cybersecurity filings with Elastic

The Securities and Exchange Commission (SEC) adopted new rules last week that require companies listed on the US Stock Exchange to disclose any material cybersecurity incidents. In addition to reporting incidents, companies are also required to describe their approach to cybersecurity risk management, strategy, and governance on an annual basis.

Identifying malicious Remote Desktop Protocol (RDP) connections with Elastic Security

The new advanced detection analytics package to detect lateral movement Lateral movement is a dangerous threat in the landscape of highly integrated technologies. If attackers gain access to an endpoint, it’s critical for security teams to identify any and all movements they make. To combat this threat, Elastic Security is excited to announce a new lateral movement detection package that makes use of advanced analytics.