


Importing COVID-19 data into Elasticsearch
Learn how you can import COVID-19 data into your elasticsearch cluster in order to correlate and analyze the impact of the outbreak with your day-to-day activities
Elasticsearch – shard optimization
Elasticsearch shards can be a daunting subject to tackle considering how much of an impact they can have on your cluster. In this article we explain what shards are and how they work and offer some advice on what can be a good practice.
Automated notifications for Microsoft account lock-out with Elastic Watcher
Elastic Watcher is a powerful tool that allows among other things for automated alerting. In this blog post we will show how you can use Watcher to quickly get notified of any data loss.
Automated alerting for data loss with Elastic Watcher
Elastic Watcher is a powerful tool that allows among other things for automated alerting. In this blog post we will show how you can use Watcher to quickly get notified of any data loss.
Image data monetization with GCP and Elastic
Find out how you can use Google’s Vision and AutoML to extract information from images and further analyze them inside the Elastic stack and possibly leverage that information into a custom built app.
Intelscale – Threat intelligence at scale
With the cybersecurity landscape becoming increasingly complex and dynamic, moving away from a reactive approach to a proactive is critical. Intelscale is an open and scalable threat intelligence solution which enables you to gain insights into cyber attacks and provide faster mitigation.
Elastic Common Schema – talking the same data language
By combining the Elastic Stack together with neural networks we created an automated process for root cause determination which we called ARCANNA (Automated Root Cause Analysis Neural Network Assisted). ARCANNA was created as an open source Elastic plugin which is easy to install and configure.
Brute Force Attack Prevention
Brute force attacks are among the most used weapons that hackers use to gain control over user or admin accounts and perform disruptive actions. The concept is simple: the attacker tries to guess the password by trying various combinations of characters and the most commonly used passwords.