Operations | Monitoring | ITSM | DevOps | Cloud

Machine learning for cybersecurity: only as effective as your implementation

We recently launched Elastic Security, combining the threat hunting and analytics tools from Elastic SIEM with the prevention and response features of Elastic Endpoint Security. This combined solution focuses on detecting and flexibly responding to security threats, with machine learning providing core capabilities for real-time protections, detections, and interactive hunting. But why are machine learning tools so important in information security? How is machine learning being applied?

Dear Search Guard users #2, including Amazon Elasticsearch Service and Open Distro, and others

Back on September 4th, we filed a lawsuit against floragunn GmbH, the makers of Search Guard, a security plugin for Elasticsearch and Kibana, for a multi-year pattern of copying our proprietary code. After filing the claim, we have continued to investigate floragunn’s actions. Today, we have updated our lawsuit in two important ways. First, we have identified additional copying by floragunn with respect to the separate, proprietary code base for our Kibana product.

Stress Management Tips for IT Business Owners

I recently had a conversation with an IT business owner who told me he felt burned out. While his business experienced steady growth over the past 12 months—and he was pleased with the positive impact on his bottom line—he felt like he’d achieved this success at the expense of his health. I knew how he felt. I’d been there too. Chances are, like a lot of people in our industry, you’ve been there too.

Preventing and mitigating data loss with Graylog

If you’re handling sensitive information, dealing with data loss can be more than just a headache. Log management tools such as Graylog can enhance your incident response and management strategies, and help you mitigate the damage when a breach occurs in your database. Minimizing data loss with a fast and scalable logging solution is key if you want to bring your cybersecurity to the next level.

What Is MTTF? Mean Time to Failure Explained in Detail

“What is MTTF?” That’s the question we’ll answer with today’s post. Yep, the article’s title makes it evident that the acronym stands for “mean time to failure.” But that, on its own, doesn’t say anything. What does “mean time to failure” actually mean? Why should you care? That’s what today’s post covers in detail.

Mitigating cyberthreats in 2020: A unified approach to endpoint security

Unsecured endpoints can cause catastrophic incidents that threaten an organization’s security and reputation. The ability to identify, preempt, and thwart breaches at the device level is critical to your organization’s security posture. In this webinar, you will learn about major attacks of the past, vulnerabilities that led to these attacks, and how to build a proactive shield against them.

What is AIOps and How is it Changing IT Operations?

IT Ops teams are under nonstop pressure to work faster and deliver better results—at less cost. This isn’t easy, as IT organizations must support infrastructure in multiple clouds, on-premises, the connections in between, and SaaS applications to enable business advantages and keep up with stakeholder expectations.

DevOps Patterns and Antipatterns for Continuous Software Updates

In this talk, we’ll analyze real-world software update fails and how multiple DevOps patterns, that fit a variety of scenarios, could have saved the developers. Manually making sure that everything works before sending an update and expecting the user to do acceptance tests before they update is most definitely not on the list of such patterns.