Author

Articles by Elastic Security Team

Videos

AI can do what now?! Accelerating SIEM migration

AI automation turns SIEM migration from months to minutes. Using LLMs and RAG, Elastic converts legacy rules, maps data, normalizes queries, and flags issues—speeding migration while keeping human review for accuracy.

Videos

AI can do what now?! Agentic AI is the autonomous future coming to security operations

Agentic AI is powering cybersecurity with autonomous threat detection, advanced hunting, automated investigations, and real-time fraud defense. But how can its nonstop work help analysts strengthen and future-proof their security posture?

Videos

AI can do what now?! How AI is fixing security's worst bottleneck

If you’re spending hours writing custom scripts, mapping fields, or troubleshooting ingest issues, you don’t have to anymore. Learn how AI can do the heavy lifting so that you can get back to doing what you do best: protecting your organization.

Videos

AI and the 2025 SIEM landscape: A guide for SOC leaders

Discover how AI is redefining the SIEM landscape. Explore key capabilities, architecture, and real-world benefits for SOC teams facing evolving cybersecurity challenges.

Videos

Day in the life of an SOC leader

Explore a day in the life of a SOC leader, and learn how they oversee analysts, lead incident response, and threat detection in today’s cybersecurity landscape.

Videos

Understanding the CISO: Role, skills, and security impact

Learn what a CISO does, key responsibilities, required skills, and how this executive role shapes enterprise cybersecurity strategy and risk management.

Videos

AI adoption in security: Top use cases and mistakes to avoid

Discover top AI use cases in cybersecurity and key pitfalls to avoid when adopting AI in your SOC to improve threat detection and response.

Videos

SOC analyst vs. security analyst: What’s the difference?

Learn what SOC and security analysts do, including key responsibilities, skills, career paths, and how they help strengthen an organization's cybersecurity posture.

Videos

Cyber threats explained: How to safeguard your enterprise

Learn practical steps to safeguard your enterprise against digital risks with this overview of common cybersecurity threats, including malware, phishing, and ransomware.