logo

Author

Articles by James Spiteri

Product Marketing Director, Security, Elastic

Videos

Demystifying SIEM migration: Pitfalls to avoid and tips for ensuring success

Migrating to a new SIEM can feel like a daunting task. This blog identifies steps you can take to reduce the pain typically associated with a migration, tools that can help along the way, and questions you should ask during each phase of a migration.

Videos

Elastic and Tines partner to detect security threats and reduce mean time to respond

Elastic and Tines are partnering to help our joint users detect security threats and reduce mean time to respond.

Videos

Elastic Protects Against Ransomware and Linux Threats in MITRE Engenuity Round 4 Eval

Elastic protects against ransomware and Linux threats in MITRE Engenuity Round 4 Eval — the solution thrived due to its new advanced ransomware protection, memory threat protection, and malicious behavior detection.

Videos

Operation Bleeding Bear

Elastic Security verifies new destructive malware targeting Ukraine: Operation Bleeding Bear

Videos

Investigate Log4Shell exploits with Elastic Security and Observability

As news of Log4shell emerged, security teams all around the globe scrambled to detect, mitigate and contain the vulnerability. This blog highlights how teams can use the Elastic Search platform to detect Log4shell exploit attempts.

Videos

Adversary emulation with Prelude Operator and Elastic Security

At Elastic, we’ve been working closely with the team at Prelude to help security teams of all skill levels, arming all analysts and red teams alike. Learn how teams can use Prelude Operator in conjunction with Elastic Security.

Videos

MITRE Engenuity ATT&CK® Round 3: Carbanak + FIN7 vs. the free and open capabilities in Elastic Security

Check out the evolution of Elastic Security, free and open, and evaluated by MITRE.

Videos

Using the Elastic Stack as a SaaS-Based Security Operations Swiss Army Knife

Here's the story of how RS2 quickly got Elastic Cloud from PoC to production by proving it as a security analytics solution.