Articles by Camilla Montonen

Bad actors (and their malware) use domain generated algorithms (DGAs) to avoid detection, but with Elastic machine learning, you can easily build models to help you see right through their tricks...

How does the Elastic Machine Learning product compute influencers, and what do influencers say about the root cause of an anomaly?

Signature-based anti-malware techniques struggle to keep up with new malware variants. Can outlier detection offer new ways to help detect malicious binaries?..

What are multi-bucket impact anomalies? How should one interpret them? What are some gotchas to keep in mind? Read on for answers to these questions and more...