Operations | Monitoring | ITSM | DevOps | Cloud

Practical security engineering: Stateful detection

Detection engineering at Elastic is both a set of reliable principles — or methodologies — and a collection of effective tools. In this series, we’ll share some of the foundational concepts that we’ve discovered over time to deliver resilient detection logic. In this blog post, we will share a concept we call stateful detection and explain why it's important for detection.

FYI: Email Alerting Isn't Enough

Email alerting is an inefficient way to receive and address critical alerts. Email inboxes tend to get flooded with “clutter,” as irrelevant messages bury urgent incident notifications. Incident management procedures require incident management systems, ensuring that urgent issues are immediately addressed. Yet, some services are reluctant to say goodbye to email alerting and its inefficiencies. This is the case with Google Voice, which recently solidified its commitment to email alerting.

How to Assess Your IT Operations Discovery to Resolution Pipeline

The 2020 State of the Cloud Report finds that 60% of enterprises will increase their cloud infrastructure usage due to Covid-19. Hybrid infrastructure adoption creates new management challenges for IT operations teams which are further exacerbated by shrinking technology budgets and staff skill shortages. Gartner predicts that 40% of IT operations teams will deploy AI-augmented automation by 2023 to keep up with customer expectations and changing business models.

Cloud SIEM: Getting More Out of Your Threat Intelligence - 3 Use Cases for IOCs

Ever since JASK was founded, we have heavily integrated with threat intelligence platforms to gain context into attacker activity through indicators of compromise (IOCs). Now that we have joined Sumo Logic, our customers have the ability to pull in more data than ever making this feature even more powerful. One of our tightest integrations is with the Anomali (formerly ThreatStream) platform.

Reputation Matters - Nexthink's Execs Share Favorite Customer Stories

Perhaps one of Nexthink’s most endearing qualities is that it has never been a “drink the kool-aid” type of company. Yes, we are proud to be the leading experience management platform in IT, but that honor is most championed from outside, not within. From its beginnings, Nexthink has been used by enterprise IT to narrow the gap between what employees expect at work and what they receive.

Logging for DevSecOps

Logging is probably not the first item to come to mind when most of us think about DevSecOps, a term that refers to the integration of security into DevOps processes, but it should be. Logging and log management play a critical role in helping to put DevSecOps principles into practice by ensuring that developers, IT operations staff, and security teams have the visibility and communication pipelines they need to prioritize security at all stages of the DevOps delivery cycle.

Splunk and the WEF - Working Together to Unlock the Potential of AI

Use of AI can be critical when developing systems to support social good, with some inspiring examples using Splunk in healthcare and higher education organisations. According to our State of Dark Data report, however, only 15% of organisations admit they are utilising AI solutions today due to lack of skills. So how can we help organisations unlock the potential of AI?

Using Observability as a Proxy for Customer Happiness

Today, users and customers are driven by response rates to their online requests. It’s no longer good enough to just have a request run to completion, it also has to fit within the perceived limits of “fast enough”. Yet, as we continue to build cloud-native applications with microservice architectures, driven by container orchestration like Kubernetes in public clouds, we need to understand the behavior of our system across all aspects, not just one.

How to Modernize Your Security Operations Center (SOC)

In an evolving world, the modernization of the security operations center (SOC) is pivotal to the success of digital transformation initiatives. Security teams, however, are facing a shortage of cybersecurity professionals and struggling to detect and prioritize high-priority threats. Analysts in data-driven organizations can combat these issues by bringing people, process and technology together.