Operations | Monitoring | ITSM | DevOps | Cloud

Machine learning for cybersecurity: only as effective as your implementation

We recently launched Elastic Security, combining the threat hunting and analytics tools from Elastic SIEM with the prevention and response features of Elastic Endpoint Security. This combined solution focuses on detecting and flexibly responding to security threats, with machine learning providing core capabilities for real-time protections, detections, and interactive hunting. But why are machine learning tools so important in information security? How is machine learning being applied?

Dear Search Guard users #2, including Amazon Elasticsearch Service and Open Distro, and others

Back on September 4th, we filed a lawsuit against floragunn GmbH, the makers of Search Guard, a security plugin for Elasticsearch and Kibana, for a multi-year pattern of copying our proprietary code. After filing the claim, we have continued to investigate floragunn’s actions. Today, we have updated our lawsuit in two important ways. First, we have identified additional copying by floragunn with respect to the separate, proprietary code base for our Kibana product.

Stress Management Tips for IT Business Owners

I recently had a conversation with an IT business owner who told me he felt burned out. While his business experienced steady growth over the past 12 months—and he was pleased with the positive impact on his bottom line—he felt like he’d achieved this success at the expense of his health. I knew how he felt. I’d been there too. Chances are, like a lot of people in our industry, you’ve been there too.

Preventing and mitigating data loss with Graylog

If you’re handling sensitive information, dealing with data loss can be more than just a headache. Log management tools such as Graylog can enhance your incident response and management strategies, and help you mitigate the damage when a breach occurs in your database. Minimizing data loss with a fast and scalable logging solution is key if you want to bring your cybersecurity to the next level.

What Is MTTF? Mean Time to Failure Explained in Detail

“What is MTTF?” That’s the question we’ll answer with today’s post. Yep, the article’s title makes it evident that the acronym stands for “mean time to failure.” But that, on its own, doesn’t say anything. What does “mean time to failure” actually mean? Why should you care? That’s what today’s post covers in detail.

What is AIOps and How is it Changing IT Operations?

IT Ops teams are under nonstop pressure to work faster and deliver better results—at less cost. This isn’t easy, as IT organizations must support infrastructure in multiple clouds, on-premises, the connections in between, and SaaS applications to enable business advantages and keep up with stakeholder expectations.

Dash to Docker for Cloud Run on Anthos Hybrid

Developing for Google Cloud Run in a hybrid system managed by Anthos isn’t a solo race, it’s a relay between cloud and on-prem. To win, you’ll need an advanced Docker registry that can swiftly pass your containers for Cloud Run functions from one environment to the next. In our example hybrid architecture, you’ll see how JFrog Container Registry can be that reliable relay partner.

Why Nine Publishing rebuilt their infrastructure using search solutions

What does the revamped, modern technology stack of a 185-year-old Australian news corporation look like? In an industry that faces serious competition from anyone with a WordPress site and something to say, Nine Publishing, producer of Australia’s three largest news sites, sought to preserve a competitive edge by understanding how to enrich the experiences of their readers and journalists, while simultaneously identifying pain points and spotting problems before they happen.