Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hunting with Elastic Security: Unmasking concealed artifacts with Elastic Stack insights

Attackers thrive in the shadows, using MITRE ATT&CK T1564 - Hide Artifacts to cloak their presence with hidden files, concealed processes, and manipulated registry keys. These stealth tactics allow adversaries to evade detection, persist undetected, and escalate their access — all while quietly exfiltrating data or disrupting operations. Imagine files, processes, and even user accounts disappearing in your environment without a trace.

Hunting with Elastic Security: Detecting credential dumping with ES|QL

In the shadowy depths of your network, whispers grow louder — something isn’t right. Adversaries are on the prowl, targeting the very keys to your kingdom: your credentials. T1003 - OS Credential Dumping is their weapon of choice to steal password hashes and sensitive authentication materials. They quietly harvest secrets to impersonate users, escalate privileges, and move laterally through your environment.

Elastic and Tines team up to offer SOAR and AIOps

Automate your security and observability workflows with Tines Workflow Automation, now available directly from Elastic Elastic and Tines are unveiling an integrated product offering to transform the crucial work of security and observability teams. We’re excited to introduce Tines Workflow Automation, available directly through Elastic.

Hunting with Elastic Security: Detecting covert data exfiltration

Not all network traffic is what it seems. Some flows conceal secrets, quietly exfiltrating sensitive data beyond your defenses. MITRE ATT&CK T1048 - Exfiltration Over Alternative Protocol is a stealth technique adversaries use to smuggle data out of your environment by bypassing traditional security controls.

Public sector data stewardship for the AI era

Artificial intelligence (AI) and generative AI (GenAI) are rapidly transforming the public sector, moving beyond theoretical possibilities to real-world applications. Proper data preparedness, stewardship, and governance will play critical roles in successful GenAI implementations. We recently hosted a webinar, Public sector data stewardship for the AI era, with industry experts Max Klaps, research director at IDC, and Dave Erickson, distinguished architect at Elastic.

The missing piece of your Zero Trust strategy: A unified data layer

How public sector agencies can solve Zero Trust challenges and break down silos with a unified data layer In the evolving and complex cyber landscape, the Zero Trust approach is instrumental in addressing both internal and external threats. It's a comprehensive strategy rather than a single solution, demanding the orchestration of multiple components to be genuinely effective.

Elastic Security wins AV-Comparatives 2024 Enterprise Approved Product Award

Awarded for outstanding protection, performance, and minimal false positives. Elastic Security has earned AV-Comparatives’ 2024 Approved Product Award in the Enterprise Main-Test Series. The honor reflects its outstanding malware defense, optimal system performance, and minimal false positives. Excelling across protection, performance, and false-positive benchmarks, Elastic Security has proven its ability to safeguard organizations without compromise.

M-21-31 logging compliance: Where are we now?

How US federal agencies can better meet advanced event logging requirements For the past four years or so, US federal agencies have been working to comply with the requirements set out in OMB M-21-31. Released in 2021, the Office of Management and Budget (OMB)’s M-21-31 memorandum provided guidance and requirements for federal agencies in order to improve centralized visibility into logging data before, during, and after cybersecurity incidents.

How Elastic can help organizations achieve CMMC compliance

The Cybersecurity Maturity Model Certification (CMMC) is a framework established by the US Department of Defense (DoD) to ensure that organizations handling Controlled Unclassified Information (CUI) implement robust cybersecurity measures. As CMMC becomes a key requirement for defense contractors, higher education institutions engaged in research or contracts with the DoD must also comply with its standards.

Will AI start taking cybersecurity jobs?

No, but it’s fundamentally changing them. Generative AI (GenAI) is quickly becoming an essential part of everyday security workflows. So … is it a partner or competitor? The wide-ranging implementation of GenAI technologies into virtually every aspect of the security stack has, on the whole, helped security teams work more efficiently to mitigate threats.