Q1 2026 — Elastic Security Labs
A quarterly look at Elastic’s security integrations ecosystem Security teams can only protect what they can see. Gaps in coverage, like a macOS fleet generating…
A quarterly look at Elastic’s security integrations ecosystem Security teams can only protect what they can see. Gaps in coverage, like a macOS fleet generating…
Recent supply chain attacks have highlighted an urgent need for organizations to shift from a reactive security posture to a preemptive exposure management strategy. Learn…
Cybersecurity is always full of surprises, and 2024 has been no exception. We’re only in October, and we’ve seen some severe curveballs come our way.…
Business email compromise attacks, otherwise known as BEC attacks, are when a hacker gains access to a corporate email account, then uses that account to…
Cybersecurity isn’t easy. Every day, attackers get a little smarter and a little quicker. And they always seem to have another trick up their sleeve.…
In classic martial arts movies, there’s always that one scene where the hero singlehandedly takes on a gang of oversized, overconfident goons. One by one,…
Background Windows endpoints ship “out of the box” with a great deal of functionality provided through both GUI and command line utilities. These native utilities…
Throughout our journey, we’ve always kept one thing at the center of everything we do: protect small to mid-sized businesses (SMBs) and their managed service…
Here we are! Another edition of Ask the Mac Guy. In this series, we’ve been discussing some of the basic principles around macOS security, such…
Throughout 2024, politics has been top of mind for a significant portion of the world’s population. By December, over two dozen countries will have held…
Preamble Last Monday night I was working late and a Slack alert came in from a monitoring tool I had built three days earlier. Axios…
Who doesn’t love a little friendly competition? Whether it’s Capture the Flag, a sales spiff, or even a family game night, competition can be a…