Darryl Peek on working for the public sector at Elastic

Darryl’s family has a long history of military service and Darryl himself has always supported the public sector — his career has taken him...

An Engineer’s Guide to Integrating ARI into Existing ACME Clients

Following our previous post on the foundational benefits of ACME Renewal Information (ARI), this one offers a detailed technical guide for incorporating ARI into...

Optimizing cloud resource costs with Elastic Observability and Tines

How can cloud engineers optimize resource costs using Elastic Observability and Tines? Follow this step-by-step guide to learn how to integrate Elastic Observability with...

Deploying Let’s Encrypt’s New Issuance Chains

On Thursday, June 6th, 2024, we will be switching issuance to use our new intermediate certificates. Simultaneously, we are removing the DST Root CA...

Sensor Intel Series: Top CVEs in February 2024

27 new CVEs, and continued IoT targeting. See what's new from February 2024. - Read more

New Intermediate Certificates

On Wednesday, March 13, 2024, Let’s Encrypt generated 10 new Intermediate CA Key Pairs, and issued 15 new Intermediate CA Certificates containing the new...

Introducing Sunlight, a CT implementation built for scalability, ease of operation, and reduced cost

Let’s Encrypt is proud to introduce Sunlight, a new implementation of a Certificate Transparency log that we built from the ground up with...

Khalil Corbin on how the arts helped shape him — and led to his...

Before joining Elastic, Khalil Corbin worked in the public sector, doing non-profit work with kids on probation — and writing for music blogs on...

A Year-End Letter from our Vice President

This letter was originally published in our 2023 Annual Report. We typically open our annual report with a letter from our Executive Director and...

Our role in supporting the nonprofit ecosystem

For more than ten years, we at the nonprofit Internet Security Research Group (ISRG) have been focused on our mission of building a more...

Latest article

What the March 2026 Threat Technique Catalog update means for your AWS environment

The AWS Customer Incident Response Team (AWS CIRT) regularly encounters patterns that repeat across their engagements when helping customers respond to security...

New BlobPhish Attack Leverages Browser Blob Objects to Steal Users’ Login Credentials

A sophisticated, memory-resident phishing campaign called BlobPhish, active since October 2024, that exploits browser Blob URL APIs to silently steal credentials from Microsoft 365...

Medtronic Confirms Data Breach After ShinyHunters Claims

Medtronic confirms IT breach as ShinyHunters claims millions of records accesseda - Read more

Why AI agents are triggering a rethink of enterprise identity

The Computer Weekly Security Think Tank considers the intersection of AI and IAM. In this article, we look at the specific impacts of agentic...