Articles by Camilla Montonen

To use machine learning in the Elastic Stack, all you need is for your data to be stored in Elasticsearch. Learn how to extract valuable insights from your data with a few clicks and build a fully operational end-to-end machine learning pipeline...

Bad actors (and their malware) use domain generated algorithms (DGA) to avoid detection, but with Elastic machine learning, you can easily build models to help you see right through their tricks. Learn how in part 2 of this series...

Bad actors (and their malware) use domain generated algorithms (DGA) to avoid detection, but with Elastic machine learning, you can easily build models to help you see right through their tricks...

How does the Elastic Machine Learning product compute influencers, and what do influencers say about the root cause of an anomaly?

Signature-based anti-malware techniques struggle to keep up with new malware variants. Can outlier detection offer new ways to help detect malicious binaries?..

What are multi-bucket impact anomalies? How should one interpret them? What are some gotchas to keep in mind? Read on for answers to these questions and more...