
A game of nations — How nation-states prepare for cyber threats with Locked Shields (part 2)
This blog is part 2 of a series on Locked Shields, the world's largest cybersecurity exercise. Learn how Elastic is typically set up during Locked Shields and gain insights into the top incidents that emerged during these simulations.

Fraud in financial services: Leaning on generative AI to protect a rapidly expanding attack surface
AI technologies, particularly machine learning and advanced analytics, have emerged as powerful tools in the fight against fraud in financial services. Combined with Elastic, FSIs can better combat this data problem.

Improving memory allocation with Libbeat output client and Elasticsearch
When Filebeat or any other beat is publishing events to a remote Elasticsearch, it relies on its _bulk API, meaning that Beats doesn’t only make requests to Elasticsearch but also parses its responses, which results in increased memory utilization.



_Blog_header_image-_Elastic_vs_AmazoN_OPT_1_V1.jpg)

