Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Security Incident and Event Management.

Defense Department's Multi-Cloud Cloud Strategy: A Role for SIEM

It’s difficult to recall a time over the last ten years when cloud requirements were not at the forefront of the Defense Department’s modernization efforts. Cloud capability reviews and requirements, in some form, extend from the Pentagon’s net-centricy efforts — to the Joint Information Environment, Digital Modernization, and up through to today.

Security use cases: The key to test the readiness of your SIEM solution

Organizations have started considering cybersecurity as a top priority lately. The amount of money invested in IT infrastructure is increasing at an exponential rate. Further, dedicated teams are formed to monitor and optimize the performance of the different solutions that each organization has in its environment. Similarly, when it comes to cybersecurity, it’s become essential to evaluate and quantify the security posture of every organization.

The secret is out: Why Open Security is key to preventing cyber threats

For decades, the cybersecurity industry has been shrouded in secrecy. This is partly because of the misunderstanding that cybersecurity often relies on obscurity as its primary form of defense. As the thinking goes, if adversaries don’t know about or understand the security controls that security vendors have in place, it will be easier to defend against cyberattacks.

The State of Security: SIEM in 2022

The world of enterprise cybersecurity is exceedingly dynamic. In a landscape that is ever-changing, security professionals need to combat a class of evolving threat actors by deploying increasingly sophisticated tools and techniques. Today with enterprises operating in an environment that is more challenging than ever, Security Information and Event Management (SIEM) platforms play an indispensable role.

I'm a former nation-state exploiter - here's why I know Open Security is our best defense

No single organization is prepared to stop an attack from a nation-state Not so long ago, I woke up every morning focused on one thing: finding and exploiting vulnerabilities. During my 10 years working for the U.S. National Security Agency (NSA), my single objective was to identify and exploit networks to collect foreign intelligence. I was fortunate to work alongside the world’s best professional vulnerability and exploit developers. My time serving my government was formative and humbling.

Graylog Security Anomaly Detection: Metrics Ease the Workload

Everything that makes employees’ lives easier, makes yours harder. Detecting insider threats — both employees and cybercriminals pretending to be employees — has never been more difficult or more important. The cloud technologies that make everyone else more efficient make security less efficient. They’re noisy. They send a lot of alerts. You’re tired. You’re overworked. You’re overloaded.

Why MSPs need to Reconsider SIEM for Office 365 Security

In 2005, a new market emerged when Gartner coined the term "SIEM" OR Security and Information Event Management. Back then, it was a legacy system aggregating event data produced by security devices, systems, network infrastructures and applications. However, it lacked monitoring functionality and was limited to vertical scalability.

Driving quantified success with Elastic Security

Insights from the 2022 Results That Matter study “88% of boards regard cybersecurity as a business risk rather than solely a technical IT problem.”1 Regardless of geography, industry, sector, or use cases, most would agree that reducing risk is a top priority for their organization. Whether it’s decreasing phishing scams, ransomware, and malware attacks or reducing the risk of customer churn due to breaches, security is everyone’s concern.

Introducing Devo Connect, Your New Online Community

For many people, cybersecurity is merely a necessary business function. But that’s not how our customers see it. For you, cybersecurity is an ever-escalating arms race involving sophisticated operators and uncounted moving parts where a single mistake can cause an avalanche of problems. Cybersecurity isn’t just your job, it’s your life. You are on the front lines, responsible for protecting your organization in a high-pressure environment every day.

Continued leadership in open and transparent security

Elastic Security has long been open — with open source roots, open development, and the release of our SIEM in 2019. In 2020, we further embraced the openness of Elastic and released our open detection-rules repo to collaborate with our users and be transparent about how we protect customers. That repo is focused on our SIEM and Security Analytics use cases and did not yet include Elastic Endpoint Security artifacts.