Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Elastic: Using Elastic to solve InfoSec problems

Organizations across the globe use Elastic to solve a wide array of security problems. Mature security teams use Elastic to perform threat hunting at scale, perform fast investigation to scope incidents, and leverage high-volume data sources to ensure accuracy and the right amount of context to make good security decisions. See a hands-on demo with real-world context to learn how Elastic has enabled security teams to: Matteo Rebeschini

Elastic: Best practices for detection with Elastic Security

Security analytics needs to rapidly adapt to changing threats. Advanced detection techniques is one of the core capabilities of security operation centres in addressing different threat use cases. However, identifying and creating appropriate detection types for the use case might be challenging. In this webinar, we will discuss different detection techniques associated with Elastic Security's detection engine presented and demonstrated in the context of real-world examples and scenarios.

Elastic: Operationalizing machine learning for SIEM

Unsupervised machine learning (ML) is a core capability for most security operations teams looking to implement an advanced threat detection or insider threat program. However, the deployment of ML can present adoption challenges for security teams. Unless they have in-house data scientists to develop and tune threat models and skilled threat hunters to investigate alerts and manually follow up on interpreting anomalous behaviors, teams may find themselves struggling to gain useful insights and operational value out of ML tools.

Elastic: Introduction to Elastic Security: How to shrink MTTR

Elastic Security unites two critical components of cybersecurity - endpoint security and SIEM - to prevent, detect, and respond to threats. Learn how Elastic Security can help you See the latest capabilities in action and learn how endpoint security and SIEM can work together to speed up detection and response. Highlights: Additional resources: Can't make it? Register and we'll send you the recording. You'll also receive an email with related content.