Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Security Incident and Event Management.

Ep 10: AI in the SOC

In this episode, we explore how AI is transforming security operations centers (SOCs) from basic log-watching teams into sophisticated threat-hunting command centers drowning in data. AI excels at processing security alerts faster than any human, but the challenge lies in balancing our growing dependence on algorithmic assistance with the irreplaceable value of human intuition in outsmarting creative attackers.

Introducing New-Scale Analytics - Analyst Workflow Demonstration

This video demonstration was produced for Exabeam Advanced Analytics customers who plan on upgrading to New-Scale Analytics. You'll learn what makes New-Scale Analytics such a powerful new solution for threat detection, investigation, and response (TDIR). LEARN MORE: Subscribe for more product demos and cybersecurity insights!

Real-Time & Historical Threat Detection with Datadog Cloud SIEM

See how Datadog’s Cloud SIEM empowers security teams with powerful, real-time and retrospective detection capabilities. In this demo, we walk through: Datadog Cloud SIEM gives your SOC high-context, actionable security signals—out of the box and fully customizable—helping you detect, investigate, and respond to threats faster.

Powering Zero Trust Networking with Elastic and Gigamon AMI

The cybersecurity perimeter is gone. In its place, a far more resilient framework has emerged: Zero Trust Networking (ZTN). This security model assumes no transaction is automatically permitted. Every connection, request, and data flow must be verified continuously. Learn how Elastic and Gigamon Application Metadata Intelligence (AMI) enable a security posture built on constant verification, rapid response, and adaptive trust.

Intelligent threat detection for defence SOCs

Advanced AI-supported threat detection for faster MTTD and MTTR The Ministry of Defence (MoD)’s own assessments describe an unacceptable cyber risk position amid an escalating wave of malicious cyber activity1 — a sobering reality for defence security operations centre (SOC) managers With the risk of cyber attack among the highest managed by the Defence Board2, the pressure on security teams is growing. SOC teams must detect sophisticated cyber threats before they cause damage.

Elastic Defend now supports macOS Tahoe 26

Elastic Defend delivers endpoint protection for macOS Tahoe 26 from the moment it’s released, ensuring your macOS fleet stays secure without delay. Apple macOS Tahoe 26 raises the bar on performance, usability, and security. Elastic Security is ready on day one, giving organizations the confidence to roll out new machines, upgrade existing devices, or evaluate macOS Tahoe 26 for future deployments without delay.

Guide to the OWASP Top 10 for LLMs: Vulnerability mitigation with Elastic

Industries, governments, and enterprises of all kinds have adopted large language models (LLMs) and generative AI (GenAI) into their operations and workflows, unlocking new possibilities for everything from customer interaction to complex data analysis. But with this innovation comes new challenges for security, observability, and data science teams.

40 Infosec Metrics Organizations Should Track

In today’s data-driven world, CISOs and senior leadership need to prove that their security programs mitigate risk. Just like grades theoretically quantify how well students understand material their teachers present, cybersecurity metrics quantify your security controls’ effectiveness. As the threat landscape becomes more complex, security teams struggle to identify the metrics that best showcase their value.