This blog introduces how to detect suspicious web traffic using Elastic Machine Learning
This blog talks about how to use Elasticsearch Machine Learning to detect email spam.
This blog talks about how to use design thinking to better address security concerns by understanding pain points.
This article talks about potential security vulnerabilities in the Cloud and how to monitor Cloud security using Elastic Stack
Watch this webinar to learn how to use Elastic Stack beyond just monitoring network infrastructure. Learn how to implement security monitoring of your critical applications (including custom ones) in order to best protect your organisation from cyber attacks. Learn how to build enhanced cyber threat hunting capabilities, and to identify security rules for customised detection – all using Elastic Stack.