Using Elasticsearch as the Back-end For Fast Prototyping

Posted by Niraj Markandey on Oct 14, 2020 8:00:00 AM

In the last article, Understanding the Elastic Stack, I broke down the various Elastic components (check it out for a quick refresher). Now we will use the REST API provided by Elasticsearch as the back-end for a simple project. But before, let us discuss why we want to use Elasticsearch REST API as back-end.

The functionality of the back-end:

Read More

Topics: Cyber Security, Elastic, elasticsearch, prototyping

Understanding the Elastic Stack

Posted by Niraj Markandey on Jun 16, 2020 8:00:00 AM

This blog will look into the entire Elastic Stack (Elasticsearch, Logstash, Kibana). 

Read More

Topics: Elastic, Kibana, elasticsearch, Logstash

Searching with Elasticsearch

Posted by Niraj Markandey on May 7, 2020 8:00:00 AM

In this blog, we will cover the Elasticsearch basics and answer questions including:

Read More

Topics: Elastic, elasticsearch, Lucene

Alexa + Watson + Tableau + Slack

Posted by Dhiraj Sharan on Jan 2, 2020 9:49:30 AM

What does this have to do with my IT & Cybersecurity log analysis


Cyber threats are accelerating by leaps and bounds in frequency and sophistication. At the same time, the cybersecurity skills shortage is growing, a projected 1.8 million empty positions by 2022. Artificial Intelligence(AI) will have a pivotal role to play to halt these growing problems.

Read More

Topics: AI for Security, Machine Learning, Artificial Intelligence, Cyber Security, Splunk, Elastic

Get To Know Query.AI

Posted by Dhiraj Sharan on Dec 4, 2019 12:11:47 PM

In the world of cyber warfare, cybersecurity threats to businesses are accelerating by leaps and bounds. They are fast and often out pacing organizations ability to prepare. According to a early 2019 Internet Security Threat Report published by Symantec, a single misconfigured cloud infrastructure could result in loss of millions or could create a compliance nightmare for the organization such as that of GDPR – General Data Protection Regulation.

Read More

Topics: Threat Detection, Artificial Intelligence, Cyber Security, Splunk, Elastic