We are thrilled to announce that Elastic Cloud Serverless has achieved several significant compliance certifications. This milestone reinforces our commitment to security, privacy, and regulatory compliance. Elastic Cloud Serverless is now audited or certified under the following industry-leading frameworks: SOC 2 Type 2, ISO 27001, ISO 27017, ISO 27018, Payment Card Industry … [Read more...] about Elastic Cloud Serverless achieves major compliance certifications
cloud
Critical Evolution of Cloud Detection and Response
When Conventional Security Meets Modern Cloud Threats As organizations face these cross-domain attacks, the inability to connect cloud context with detection and alerting is reaching its breaking point. Most organizations begin their cloud security journey focused on visibility through CNAPP solutions. CNAPP identifies misconfigurations, excessive permissions and … [Read more...] about Critical Evolution of Cloud Detection and Response
Unify Security Posture and Protection for Faster Cloud Detection and Response
Adversaries are taking aim at cloud environments, as evidenced by the 75% increase in cloud intrusions in 2023. Organizations are under growing pressure to ensure they have measures in place to effectively detect, investigate and respond to cloud-focused attacks. Cloud detection and response (CDR) is uniquely challenging for SOC teams due to their limited visibility into … [Read more...] about Unify Security Posture and Protection for Faster Cloud Detection and Response
Ruijie Networks’ Cloud Platform Flaws Could Expose 50,000 Devices to Remote Attacks
Dec 25, 2024Ravie LakshmananCloud Security / Vulnerability Cybersecurity researchers have discovered several security flaws in the cloud management platform developed by Ruijie Networks that could permit an attacker to take control of the network appliances. "These vulnerabilities affect both the Reyee platform, as well as Reyee OS network devices," Claroty researchers Noam … [Read more...] about Ruijie Networks’ Cloud Platform Flaws Could Expose 50,000 Devices to Remote Attacks
Elastic and Google Cloud in 2024: Celebrating innovation and progress
Elastic and Google Cloud create a powerhouse of AI-driven insights, providing an end-to-end search, observability, and security journey to our joint customers. We continue to partner on many opportunities for success, especially around generative AI (GenAI), and have made further progress this year in empowering customers throughout their business transformation.This blog … [Read more...] about Elastic and Google Cloud in 2024: Celebrating innovation and progress
How Cisco Uses Isovalent to Secure Cloud Workloads
As cloud environment evolve, efficient and effective workload security has been at the top of the list. At Cisco, we have integrated the Isovalent platform into our infrastructure to ensure our cloud workloads are protected without compromising on performance. Why Isovalent? The Isovalent platform is based on the eBPF (extended Berkeley Packet Filter) technology that … [Read more...] about How Cisco Uses Isovalent to Secure Cloud Workloads
Cloud Data Logs: Heroes of Detection and Response
These logs provide deep visibility into the resource and service layers of cloud environments, enabling security teams to monitor for suspicious behavior, identify vulnerabilities and detect unauthorized actions. In the event of a breach, cloud logs are essential for incident response. They serve as the digital evidence needed to understand how an attack unfolded, which … [Read more...] about Cloud Data Logs: Heroes of Detection and Response
How ASPM Elevates Security for Today’s Cloud Ecosystem
Cloud technology has revolutionized business operations, but the digital transformation required to adopt and scale cloud technology exposes vulnerabilities that traditional cybersecurity approaches struggle to address — often leaving organizations vulnerable to adversaries. Organizations face mounting challenges in managing security risks across cloud-native applications. … [Read more...] about How ASPM Elevates Security for Today’s Cloud Ecosystem
CrowdStrike Showcases Cloud Security Innovation and Leadership at AWS re:Invent
Together, these innovations deliver a unified, proactive approach to protecting cloud environments and providing the full context needed to stay ahead of emerging threats. CrowdStrike Achieves AWS AI Competencies AWS GenAI Competency: CrowdStrike has achieved the AWS Generative AI Competency, distinguishing us as a leader in advancing generative AI solutions that … [Read more...] about CrowdStrike Showcases Cloud Security Innovation and Leadership at AWS re:Invent
Connect a custom AWS S3 snapshot repository to Elastic Cloud
In this blog, we will walk through backing up our committed cluster data via Elasticsearch’s snapshots into an AWS S3 bucket. In Elastic Cloud (Enterprise), Elastic provides a built-in backup service under its found-snapshots repository. Elasticsearch also supports custom repositories for both Cloud and on-prem setups, connecting to data stores like AWS S3, GCP, and Azure for … [Read more...] about Connect a custom AWS S3 snapshot repository to Elastic Cloud