Our next-gen architecture is built to help you make sense of your ever-growing data. Watch a 4-min demo video!

Security

Is the New Elasticsearch SSPL License a Threat to Your Business?
9 min

Is the New Elasticsearch SSPL License a Threat to Your Business?

Recent changes to the Elasticsearch license could have consequences on your intellectual property. Elasticsearch and Kibana as recently published by Elastic will no longer be licensed…

Network Security: The Journey from Chewiness to Zero Trust Networking
7 min

Network Security: The Journey from Chewiness to Zero Trust Networking

Network security has changed a lot over the years, it had to. From wide open infrastructures to tightly controlled environments, the standard practices of network security…

Stop Enforcing Security Standards – Start Implementing Policies
5 min

Stop Enforcing Security Standards – Start Implementing Policies

In days gone by, highly regulated industries like pharmaceuticals and finance were the biggest targets for nefarious cyber actors, due to the financial resources at banks…

5 Common Elasticsearch Mistakes That Lead to Data Breaches
10 min

5 Common Elasticsearch Mistakes That Lead to Data Breaches

Avon and Family Tree aren’t companies you would normally associate with cybersecurity, but this year, all three were on the wrong side of it when they…

SIEM Tutorial: What should a good SIEM Provider do for you?
7 min

SIEM Tutorial: What should a good SIEM Provider do for you?

Modern day Security Information and Event Management (SIEM) tooling enterprise security technology combine systems together for a comprehensive view of IT security. This can be tricky,…

Writing Effective Suricata Rules with Examples [Best Practices]
8 min

Writing Effective Suricata Rules with Examples [Best Practices]

This post will help you write effective Suricata Rules to materially improve your security posture. We’ll begin with a breakdown of how a Rule is constructed…

The Cloud Network Security Gap
13 min

The Cloud Network Security Gap

Before we dive into the gap in cloud network security, let’s take a step back. If you’ve been in Operations for a while, you might remember…

Elasticsearch Vulnerability: How to Remediate the Most Recent Issues
6 min

Elasticsearch Vulnerability: How to Remediate the Most Recent Issues

An Elastic Security Advisory (ESA) is a notice from Elastic to its users of a new Elasticsearch vulnerability. The vendor assigns both a CVE and an…

How SIEM is evolving in 2020
8 min

How SIEM is evolving in 2020

The evolution of Security Information and Event Management (SIEM) is deeply intertwined with cloud computing, both in terms of technological breakthroughs the cloud provided and from…

Where Modern Observability
and Financial Savvy Meet.