Articles by Asjad Athick

The Australian Cyber Security Centre (ACSC) recently published advisory 2020-008 about the "copy-paste compromises". This blog post highlights ways Elastic Security can protect organisations targeted by groups like those described in this report...

Learn how to set up observability of your Kubernetes environment using the Elastic Stack. We will use Metricbeat and Filebeat to pull log and metric data from Amazon EKS to populate out-of-the-box dashboards...