Navigating the web of Scattered Spider: Defending financial institutions from cybercriminal networks
Elastic Blog
by Richard Towle,Brandon Mavleos
9h ago
In today’s rapidly evolving cyber threat landscape, financial institutions face an increasingly sophisticated array of adversaries. Among these, Scattered Spider is one cybercriminal group that acts with precision, persistence, and proficiency in exploiting vulnerabilities within large corporations and their IT infrastructures. This group has garnered attention not just for its disruptive capabilities but also for its targeted approach toward enterprises, including pivotal players in the financial services industry. The recent advisory released by the Cybersecurity and Infrastructure Security ..read more
Visit website
Elastic Universal Profiling: Delivering performance improvements and reduced costs
Elastic Blog
by Luca Wintergerst,Tim Rühsen
9h ago
In today's age of cloud services and SaaS platforms, continuous improvement isn't just a goal — it's a necessity. Here at Elastic, we're always on the lookout for ways to fine-tune our systems, be it our internal tools or the Elastic Cloud service. Our recent investigation in performance optimization within our Elastic Cloud QA environment, guided by Elastic Universal Profiling, is a great example of how we turn data into actionable insights. In this blog, we’ll cover how a discovery by one of our engineers led to savings of thousands of dollars in our QA environment and magnitudes more once w ..read more
Visit website
Exploring 11 popular machine learning algorithms
Elastic Blog
by The Elastic Platform team
3d ago
Over the past few years, machine learning (ML) has quietly become an integral part of our daily lives. It impacts everything from personalized recommendations on shopping and streaming sites to protecting our inboxes from the onslaught of spam we get every day. But it’s not purely a tool for our convenience. Machine learning has become crucial in the current tech landscape, and that doesn’t look like it’ll change any time soon. It’s used to unlock hidden insights in data, automate tasks and processes, enhance decision-making, and push the boundaries of innovation. At the core of this technolog ..read more
Visit website
Revealing unknowns in your tracing data with inferred spans in OpenTelemetry
Elastic Blog
by Jonas Kunz,Alexander Wert
3d ago
In the complex world of microservices and distributed systems, achieving transparency and understanding the intricacies and inefficiencies of service interactions and request flows has become a paramount challenge. Distributed tracing is essential in understanding distributed systems. But distributed tracing, whether manually applied or auto-instrumented, is usually rather coarse-grained. Hence, distributed tracing covers only a limited fraction of the system and can easily miss parts of the system that are the most useful to trace. Addressing this gap, Elastic developed the concept of inferre ..read more
Visit website
3 reasons why you should become an Elastic community ambassador
Elastic Blog
by Ully Sampaio
5d ago
In the ever-changing and fast-paced world of technology, developers often serve as our North Star — they're adept at conveying a complex vision, bringing innovative applications to life, and influencing the adoption of various technologies. One impactful approach for developers to enhance their influence and contribute to the growth of the tech ecosystem is by joining ambassador programs, such as the Elastic Contributor Program. We already know how awesome you think it is to be a top contributor, but here are three more compelling reasons why developers should join our program. 1. Amplifying y ..read more
Visit website
Elastic’s Sylvie Lohier shares the secrets to her 4 promotions in 4 years
Elastic Blog
by Sarah Lindauer
5d ago
On paper, Sylvie Lohier has achieved remarkable growth at Elastic, the leading platform for search-powered solutions. In four years, she’s grown from consulting manager to consulting practice director for the Asia Pacific and Japan region — via four promotions. However, her story is defined by something other than new job titles or raises. “Achieving a promotion is not an end goal,” says Sylvie. “It’s your mindset and attitude to work that are key to driving your growth.” With each new responsibility handed her way, Sylvie leaned into how she could create the biggest impact and further Elas ..read more
Visit website
Understanding the approximate nearest neighbor (ANN) algorithm
Elastic Blog
by The Elastic Platform team
1w ago
If you grew up in a time before the internet made its debut, you’ll remember it wasn’t always easy to find new things to like. We discovered new bands when we happened to hear them on the radio, we’d see a new TV show by accident because we forgot to change the channel, and we’d find a new favorite video game based almost entirely on the picture on the cover.  Nowadays, things are very different. Spotify will point me to artists that match my tastes, Netflix will highlight movies and TV shows it knows we’ll enjoy, and Xbox knows what we’ll probably want to play next. These recommendation ..read more
Visit website
Elastic Universal Profiling agent, a continuous profiling solution, is now open source
Elastic Blog
by Israel Ogbole,Christos Kalkanis
1w ago
..read more
Visit website
Sovereign solutions for sensitive workloads: Elastic on Google Distributed Cloud Hosted
Elastic Blog
by Valerio Arvizzigno
1w ago
Maintaining sovereignty over sensitive workloads is paramount, especially in industries like public sector and telecommunications. Combining this need with cloud adoption and the innovation acceleration it provides is not always an easy path. Thus, sovereign cloud solutions, ensuring data residency, regulatory compliance, and security become indispensable for organizations dealing with highly sensitive data. With data sovereignty, organizations retain control over their data, mitigating risks associated with data breaches, regulatory noncompliance, and geopolitical considerations. Elastic prio ..read more
Visit website
Zero Trust requires unified data
Elastic Blog
by Woody Walton,Michael Young
1w ago
It’s vital to have a common understanding and shared context for complex technical topics. The previously adopted perimeter model of security has become outdated and inadequate. Zero Trust (ZT) is the current security model being designed and deployed across the US federal government. It’s important to point out that ZT is not a security solution itself. Instead, it’s a security methodology and framework that assumes threats exist both inside and outside of an environment.  The ZT security model has two parts: Zero Trust Architecture (ZTA) and Zero Trust Network Access (ZTNA). ZTA focuses ..read more
Visit website

Follow Elastic Blog on FeedSpot

Continue with Google
Continue with Apple
OR