Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Insight beyond annual risk using attack chain mapping

Thriving organizations maximally allocate resources. With seemingly infinite cybersecurity threats and finite resources, everyone needs to know the size of the threat to determine priority, and where to invest to maximize ROI. Elastic takes a quantified approach to cybersecurity risk management using FAIR to break threat scenarios into (A) likelihood and (B) losses to calculate risk per year, AKA annualized loss expectancy, or in FAIR terms, simply “risk”.

Hunting with Elastic Security: Unmasking concealed artifacts with Elastic Stack insights

Attackers thrive in the shadows, using MITRE ATT&CK T1564 - Hide Artifacts to cloak their presence with hidden files, concealed processes, and manipulated registry keys. These stealth tactics allow adversaries to evade detection, persist undetected, and escalate their access — all while quietly exfiltrating data or disrupting operations. Imagine files, processes, and even user accounts disappearing in your environment without a trace.

Hunting with Elastic Security: Detecting credential dumping with ES|QL

In the shadowy depths of your network, whispers grow louder — something isn’t right. Adversaries are on the prowl, targeting the very keys to your kingdom: your credentials. T1003 - OS Credential Dumping is their weapon of choice to steal password hashes and sensitive authentication materials. They quietly harvest secrets to impersonate users, escalate privileges, and move laterally through your environment.

Elastic and Tines team up to offer SOAR and AIOps

Automate your security and observability workflows with Tines Workflow Automation, now available directly from Elastic Elastic and Tines are unveiling an integrated product offering to transform the crucial work of security and observability teams. We’re excited to introduce Tines Workflow Automation, available directly through Elastic.

Hunting with Elastic Security: Detecting covert data exfiltration

Not all network traffic is what it seems. Some flows conceal secrets, quietly exfiltrating sensitive data beyond your defenses. MITRE ATT&CK T1048 - Exfiltration Over Alternative Protocol is a stealth technique adversaries use to smuggle data out of your environment by bypassing traditional security controls.

Public sector data stewardship for the AI era

Artificial intelligence (AI) and generative AI (GenAI) are rapidly transforming the public sector, moving beyond theoretical possibilities to real-world applications. Proper data preparedness, stewardship, and governance will play critical roles in successful GenAI implementations. We recently hosted a webinar, Public sector data stewardship for the AI era, with industry experts Max Klaps, research director at IDC, and Dave Erickson, distinguished architect at Elastic.

The missing piece of your Zero Trust strategy: A unified data layer

How public sector agencies can solve Zero Trust challenges and break down silos with a unified data layer In the evolving and complex cyber landscape, the Zero Trust approach is instrumental in addressing both internal and external threats. It's a comprehensive strategy rather than a single solution, demanding the orchestration of multiple components to be genuinely effective.

Elastic Security wins AV-Comparatives 2024 Enterprise Approved Product Award

Awarded for outstanding protection, performance, and minimal false positives. Elastic Security has earned AV-Comparatives’ 2024 Approved Product Award in the Enterprise Main-Test Series. The honor reflects its outstanding malware defense, optimal system performance, and minimal false positives. Excelling across protection, performance, and false-positive benchmarks, Elastic Security has proven its ability to safeguard organizations without compromise.

M-21-31 logging compliance: Where are we now?

How US federal agencies can better meet advanced event logging requirements For the past four years or so, US federal agencies have been working to comply with the requirements set out in OMB M-21-31. Released in 2021, the Office of Management and Budget (OMB)’s M-21-31 memorandum provided guidance and requirements for federal agencies in order to improve centralized visibility into logging data before, during, and after cybersecurity incidents.