Articles by Camilla Montonen

In this blog, we announce our first-ever supervised ML and security integration. This offers users a supervised ML solution package to detect domain generation algorithm (DGA) activity in your network data...

To use machine learning in the Elastic Stack, all you need is for your data to be stored in Elasticsearch. Learn how to extract valuable insights from your data with a few clicks and build a fully operational end-to-end machine learning pipeline...

Bad actors (and their malware) use domain generated algorithms (DGA) to avoid detection, but with Elastic machine learning, you can easily build models to help you see right through their tricks. Learn how in part 2 of this series...

Bad actors (and their malware) use domain generated algorithms (DGA) to avoid detection, but with Elastic machine learning, you can easily build models to help you see right through their tricks...

How does the Elastic Machine Learning product compute influencers, and what do influencers say about the root cause of an anomaly?

Signature-based anti-malware techniques struggle to keep up with new malware variants. Can outlier detection offer new ways to help detect malicious binaries?..

What are multi-bucket impact anomalies? How should one interpret them? What are some gotchas to keep in mind? Read on for answers to these questions and more...