home.social

#graylog โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #graylog, aggregated by home.social.

  1. Graylog 7.1 just shipped

    Auto-investigations from asset risk thresholds. One-click Slice-By triage. Anomaly detection plugged directly into your alert workflow.

    May the 4th be with your alert queue.

    See what's new: graylog.org/post/may-the-logs-

    #graylog #SIEM #MayThe4th

  2. Collecting and analyzing log data becomes challenging in a multi-tiered architecture or a dynamic microservice environment. The LPI DevOps Tools Engineer 2.0 exam covers log management and analysis in objective 704.3.

    Learn more from Fabian Thorns and Uirรก Ribeiro: lpi.org/5swa

  3. Grateful and humbled. Another RSA in the books, great conversations, and new hardware to show for it.

    Thanks to all who stopped by and chatted with us.

    #RSAC2026 #Graylog #SIEM #CyberSecurity

  4. Is your financial institution as safe as it could be from #ransomware and other cyber threats? ๐Ÿค” Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. ๐Ÿฆ ๐Ÿ’ฐ

    But have no fear, Graylog + Model Context Protocol (MCP) are here to help! ๐Ÿฆธ๐Ÿ’ช Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources โ€” to enable threat detection content in their current #Graylog deployment.

    See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.๐Ÿ‘‡

    graylog.org/post/how-to-use-mc

    #CyberThreats #FinServ #GraylogLabs #TDIR #ThreatDetection

  5. Is your financial institution as safe as it could be from #ransomware and other cyber threats? ๐Ÿค” Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. ๐Ÿฆ ๐Ÿ’ฐ

    But have no fear, Graylog + Model Context Protocol (MCP) are here to help! ๐Ÿฆธ๐Ÿ’ช Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources โ€” to enable threat detection content in their current #Graylog deployment.

    See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.๐Ÿ‘‡

    graylog.org/post/how-to-use-mc

    #CyberThreats #FinServ #GraylogLabs #TDIR #ThreatDetection

  6. Is your financial institution as safe as it could be from #ransomware and other cyber threats? ๐Ÿค” Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. ๐Ÿฆ ๐Ÿ’ฐ

    But have no fear, Graylog + Model Context Protocol (MCP) are here to help! ๐Ÿฆธ๐Ÿ’ช Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources โ€” to enable threat detection content in their current #Graylog deployment.

    See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.๐Ÿ‘‡

    graylog.org/post/how-to-use-mc

    #CyberThreats #FinServ #GraylogLabs #TDIR #ThreatDetection

  7. Is your financial institution as safe as it could be from #ransomware and other cyber threats? ๐Ÿค” Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. ๐Ÿฆ ๐Ÿ’ฐ

    But have no fear, Graylog + Model Context Protocol (MCP) are here to help! ๐Ÿฆธ๐Ÿ’ช Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources โ€” to enable threat detection content in their current #Graylog deployment.

    See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.๐Ÿ‘‡

    graylog.org/post/how-to-use-mc

    #CyberThreats #FinServ #GraylogLabs #TDIR #ThreatDetection

  8. Is your financial institution as safe as it could be from #ransomware and other cyber threats? ๐Ÿค” Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. ๐Ÿฆ ๐Ÿ’ฐ

    But have no fear, Graylog + Model Context Protocol (MCP) are here to help! ๐Ÿฆธ๐Ÿ’ช Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources โ€” to enable threat detection content in their current #Graylog deployment.

    See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.๐Ÿ‘‡

    graylog.org/post/how-to-use-mc

    #CyberThreats #FinServ #GraylogLabs #TDIR #ThreatDetection

  9. #Graylog 7.0 is out, and Ethan C. Keaton's avatar is here to show you how to upgrade! ๐Ÿ’ฅ Whether you're running a small log server or managing an enterprise cluster, keeping Graylog up to date means better performance, stronger #security, and access to the latest features. ๐Ÿ‘

    Watch now and get help with preparing your system, upgrading MongoDB and Data Node safely, and more. Ready to get it done without breaking your setup? ๐Ÿ‘€ Let's go! ๐Ÿ‘‡

    ๐Ÿ“บ youtube.com/watch?v=uWZlC5DY9WA #CyberSecurity #LogManagement #SIEM #TDIR

  10. #Graylog 7.0 is out, and Ethan C. Keaton's avatar is here to show you how to upgrade! ๐Ÿ’ฅ Whether you're running a small log server or managing an enterprise cluster, keeping Graylog up to date means better performance, stronger #security, and access to the latest features. ๐Ÿ‘

    Watch now and get help with preparing your system, upgrading MongoDB and Data Node safely, and more. Ready to get it done without breaking your setup? ๐Ÿ‘€ Let's go! ๐Ÿ‘‡

    ๐Ÿ“บ youtube.com/watch?v=uWZlC5DY9WA #CyberSecurity #LogManagement #SIEM #TDIR

  11. #Graylog 7.0 is out, and Ethan C. Keaton's avatar is here to show you how to upgrade! ๐Ÿ’ฅ Whether you're running a small log server or managing an enterprise cluster, keeping Graylog up to date means better performance, stronger #security, and access to the latest features. ๐Ÿ‘

    Watch now and get help with preparing your system, upgrading MongoDB and Data Node safely, and more. Ready to get it done without breaking your setup? ๐Ÿ‘€ Let's go! ๐Ÿ‘‡

    ๐Ÿ“บ youtube.com/watch?v=uWZlC5DY9WA #CyberSecurity #LogManagement #SIEM #TDIR

  12. #Graylog 7.0 is out, and Ethan C. Keaton's avatar is here to show you how to upgrade! ๐Ÿ’ฅ Whether you're running a small log server or managing an enterprise cluster, keeping Graylog up to date means better performance, stronger #security, and access to the latest features. ๐Ÿ‘

    Watch now and get help with preparing your system, upgrading MongoDB and Data Node safely, and more. Ready to get it done without breaking your setup? ๐Ÿ‘€ Let's go! ๐Ÿ‘‡

    ๐Ÿ“บ youtube.com/watch?v=uWZlC5DY9WA #CyberSecurity #LogManagement #SIEM #TDIR

  13. #Graylog 7.0 is out, and Ethan C. Keaton's avatar is here to show you how to upgrade! ๐Ÿ’ฅ Whether you're running a small log server or managing an enterprise cluster, keeping Graylog up to date means better performance, stronger #security, and access to the latest features. ๐Ÿ‘

    Watch now and get help with preparing your system, upgrading MongoDB and Data Node safely, and more. Ready to get it done without breaking your setup? ๐Ÿ‘€ Let's go! ๐Ÿ‘‡

    ๐Ÿ“บ youtube.com/watch?v=uWZlC5DY9WA #CyberSecurity #LogManagement #SIEM #TDIR

  14. On-tap for today we have... detection chains! ๐Ÿ”Žโ›“๏ธ๐Ÿ’ฅ On your #Graylog Security Events page, there is a new badge for events that are detection chainsโ€”or as we like to call them "attack campaigns".

    Wondering what a detection chain looks like in #Graylog? ๐Ÿค” Rich Murphy, Director of Product Management for #Security at Graylog, will show you. ๐Ÿ‘€๐Ÿ‘‡

    youtube.com/watch?v=tCM_8SEXUuw #CyberSecurity #SIEM #APISecurity

  15. Welcome to November, the end of daylight savings time, and everything "T-Day" for the next four weeks! In the spirit of this month we've got a feast of new features, a cornucopia of new capabilities and a banquet of breakthroughs to share with you. ๐Ÿฆƒ ๐Ÿซต Introducing #Graylog 7.0! ๐ŸŽŠ

    Let's take a look at the new improvements across dashboards, automation, and #AI support. There are four key ingredients in this 7.0 #Thanksgiving feast:

    ๐Ÿ’ก Smarter Dashboards that deliver faster, more meaningful insights
    ๐Ÿ› ๏ธ Guided Remediation that ensures consistent, reliable action
    ๐Ÿ’ฒ Cost-efficient Data Lake Integration that simplifies cloud management
    ๐Ÿค Native MCP Support that brings intelligent collaboration to every investigation

    Ready to learn more? Take a look at the menu and more, in this article by Seth Goldhammer.

    graylog.org/post/gobbling-up-i #CyberSecurity #SIEM #APISecurity #TDIR

  16. Welcome to November, the end of daylight savings time, and everything "T-Day" for the next four weeks! In the spirit of this month we've got a feast of new features, a cornucopia of new capabilities and a banquet of breakthroughs to share with you. ๐Ÿฆƒ ๐Ÿซต Introducing #Graylog 7.0! ๐ŸŽŠ

    Let's take a look at the new improvements across dashboards, automation, and #AI support. There are four key ingredients in this 7.0 #Thanksgiving feast:

    ๐Ÿ’ก Smarter Dashboards that deliver faster, more meaningful insights
    ๐Ÿ› ๏ธ Guided Remediation that ensures consistent, reliable action
    ๐Ÿ’ฒ Cost-efficient Data Lake Integration that simplifies cloud management
    ๐Ÿค Native MCP Support that brings intelligent collaboration to every investigation

    Ready to learn more? Take a look at the menu and more, in this article by Seth Goldhammer.

    graylog.org/post/gobbling-up-i #CyberSecurity #SIEM #APISecurity #TDIR

  17. Welcome to November, the end of daylight savings time, and everything "T-Day" for the next four weeks! In the spirit of this month we've got a feast of new features, a cornucopia of new capabilities and a banquet of breakthroughs to share with you. ๐Ÿฆƒ ๐Ÿซต Introducing #Graylog 7.0! ๐ŸŽŠ

    Let's take a look at the new improvements across dashboards, automation, and #AI support. There are four key ingredients in this 7.0 #Thanksgiving feast:

    ๐Ÿ’ก Smarter Dashboards that deliver faster, more meaningful insights
    ๐Ÿ› ๏ธ Guided Remediation that ensures consistent, reliable action
    ๐Ÿ’ฒ Cost-efficient Data Lake Integration that simplifies cloud management
    ๐Ÿค Native MCP Support that brings intelligent collaboration to every investigation

    Ready to learn more? Take a look at the menu and more, in this article by Seth Goldhammer.

    graylog.org/post/gobbling-up-i #CyberSecurity #SIEM #APISecurity #TDIR

  18. Welcome to November, the end of daylight savings time, and everything "T-Day" for the next four weeks! In the spirit of this month we've got a feast of new features, a cornucopia of new capabilities and a banquet of breakthroughs to share with you. ๐Ÿฆƒ ๐Ÿซต Introducing #Graylog 7.0! ๐ŸŽŠ

    Let's take a look at the new improvements across dashboards, automation, and #AI support. There are four key ingredients in this 7.0 #Thanksgiving feast:

    ๐Ÿ’ก Smarter Dashboards that deliver faster, more meaningful insights
    ๐Ÿ› ๏ธ Guided Remediation that ensures consistent, reliable action
    ๐Ÿ’ฒ Cost-efficient Data Lake Integration that simplifies cloud management
    ๐Ÿค Native MCP Support that brings intelligent collaboration to every investigation

    Ready to learn more? Take a look at the menu and more, in this article by Seth Goldhammer.

    graylog.org/post/gobbling-up-i #CyberSecurity #SIEM #APISecurity #TDIR

  19. Welcome to November, the end of daylight savings time, and everything "T-Day" for the next four weeks! In the spirit of this month we've got a feast of new features, a cornucopia of new capabilities and a banquet of breakthroughs to share with you. ๐Ÿฆƒ ๐Ÿซต Introducing #Graylog 7.0! ๐ŸŽŠ

    Let's take a look at the new improvements across dashboards, automation, and #AI support. There are four key ingredients in this 7.0 #Thanksgiving feast:

    ๐Ÿ’ก Smarter Dashboards that deliver faster, more meaningful insights
    ๐Ÿ› ๏ธ Guided Remediation that ensures consistent, reliable action
    ๐Ÿ’ฒ Cost-efficient Data Lake Integration that simplifies cloud management
    ๐Ÿค Native MCP Support that brings intelligent collaboration to every investigation

    Ready to learn more? Take a look at the menu and more, in this article by Seth Goldhammer.

    graylog.org/post/gobbling-up-i #CyberSecurity #SIEM #APISecurity #TDIR

  20. With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffsโ€”like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. ๐Ÿ’ธ

    But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. ๐Ÿ˜ฑ Seriously... when you drop data, you drop context! ๐Ÿ‘Ž And, missing context can turn a minor oversight into a major blind spot. ๐Ÿ™ˆ

    Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. ๐Ÿ’ก

    youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  21. With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffsโ€”like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. ๐Ÿ’ธ

    But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. ๐Ÿ˜ฑ Seriously... when you drop data, you drop context! ๐Ÿ‘Ž And, missing context can turn a minor oversight into a major blind spot. ๐Ÿ™ˆ

    Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. ๐Ÿ’ก

    youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  22. With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffsโ€”like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. ๐Ÿ’ธ

    But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. ๐Ÿ˜ฑ Seriously... when you drop data, you drop context! ๐Ÿ‘Ž And, missing context can turn a minor oversight into a major blind spot. ๐Ÿ™ˆ

    Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. ๐Ÿ’ก

    youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  23. With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffsโ€”like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. ๐Ÿ’ธ

    But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. ๐Ÿ˜ฑ Seriously... when you drop data, you drop context! ๐Ÿ‘Ž And, missing context can turn a minor oversight into a major blind spot. ๐Ÿ™ˆ

    Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. ๐Ÿ’ก

    youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  24. With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffsโ€”like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. ๐Ÿ’ธ

    But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. ๐Ÿ˜ฑ Seriously... when you drop data, you drop context! ๐Ÿ‘Ž And, missing context can turn a minor oversight into a major blind spot. ๐Ÿ™ˆ

    Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. ๐Ÿ’ก

    youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  25. ๐Ÿ’กIt's time to learn about some features and fixes that will make your daily work in #Graylog smoother. ๐Ÿ‘ In our most recent blog by the Graylog Development Team, we're highlighting a minor but functional enhancement โ€” Graylog time-range stepping.

    To fix manual time-range adjustment limitations we now have two new time range navigation buttons that let you step forward and backward through your logs, one time range at a time. โฌ…๏ธ โžก๏ธ Learn more about this feature here: graylog.org/post/sliding-throu

    ๐Ÿ“ป And, stay tuned for more in this series from Konrad Merz and the rest of the Graylog Development Team! #CyberSecurity #SIEM #APISecurity #GraylogLabs

  26. Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! ๐Ÿชต โ˜• This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action โ€” and get smarter security ops that reduce risk. โฌ‡๏ธ โš ๏ธ

    From alert fatigue to risk-first response, let's unpack practical ways you can:
    โœ”๏ธ Prioritize real threats
    โœ”๏ธ Automate with context
    โœ”๏ธ Make incident response faster & more effective
    โœ”๏ธ Make SOAR useful for lean teams

    In this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.

    ๐Ÿ“บ ๐Ÿ‘‰ youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  27. Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! ๐Ÿชต โ˜• This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action โ€” and get smarter security ops that reduce risk. โฌ‡๏ธ โš ๏ธ

    From alert fatigue to risk-first response, let's unpack practical ways you can:
    โœ”๏ธ Prioritize real threats
    โœ”๏ธ Automate with context
    โœ”๏ธ Make incident response faster & more effective
    โœ”๏ธ Make SOAR useful for lean teams

    In this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.

    ๐Ÿ“บ ๐Ÿ‘‰ youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  28. Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! ๐Ÿชต โ˜• This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action โ€” and get smarter security ops that reduce risk. โฌ‡๏ธ โš ๏ธ

    From alert fatigue to risk-first response, let's unpack practical ways you can:
    โœ”๏ธ Prioritize real threats
    โœ”๏ธ Automate with context
    โœ”๏ธ Make incident response faster & more effective
    โœ”๏ธ Make SOAR useful for lean teams

    In this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.

    ๐Ÿ“บ ๐Ÿ‘‰ youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  29. Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! ๐Ÿชต โ˜• This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action โ€” and get smarter security ops that reduce risk. โฌ‡๏ธ โš ๏ธ

    From alert fatigue to risk-first response, let's unpack practical ways you can:
    โœ”๏ธ Prioritize real threats
    โœ”๏ธ Automate with context
    โœ”๏ธ Make incident response faster & more effective
    โœ”๏ธ Make SOAR useful for lean teams

    In this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.

    ๐Ÿ“บ ๐Ÿ‘‰ youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  30. Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! ๐Ÿชต โ˜• This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action โ€” and get smarter security ops that reduce risk. โฌ‡๏ธ โš ๏ธ

    From alert fatigue to risk-first response, let's unpack practical ways you can:
    โœ”๏ธ Prioritize real threats
    โœ”๏ธ Automate with context
    โœ”๏ธ Make incident response faster & more effective
    โœ”๏ธ Make SOAR useful for lean teams

    In this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.

    ๐Ÿ“บ ๐Ÿ‘‰ youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  31. Drum roll please! ๐Ÿฅ๐Ÿฅ๐Ÿฅ Today we are excited to introduce the new Logs & Lattes podcast. ๐Ÿ’ฅ๐ŸŽ™๏ธ In this inaugural episode, Seth Goldhammer joins host Palmer Wallace to talk about the hidden cost of traditional #SIEM pricing. โ›” ๐Ÿ’ต ๐Ÿค”

    How much value are we really getting from our logs, and what are we giving up to stay on budget? Let's talk about how ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffsโ€”like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. ๐Ÿ˜“

    But, thereโ€™s a smarter way forward. ๐Ÿ˜ Learn how to escape this tradeoff trap and get the most out of your security data. Watch now! ๐Ÿ“บ ๐Ÿ‘‡

    youtu.be/c7he-teNdO8 #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  32. Drum roll please! ๐Ÿฅ๐Ÿฅ๐Ÿฅ Today we are excited to introduce the new Logs & Lattes podcast. ๐Ÿ’ฅ๐ŸŽ™๏ธ In this inaugural episode, Seth Goldhammer joins host Palmer Wallace to talk about the hidden cost of traditional #SIEM pricing. โ›” ๐Ÿ’ต ๐Ÿค”

    How much value are we really getting from our logs, and what are we giving up to stay on budget? Let's talk about how ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffsโ€”like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. ๐Ÿ˜“

    But, thereโ€™s a smarter way forward. ๐Ÿ˜ Learn how to escape this tradeoff trap and get the most out of your security data. Watch now! ๐Ÿ“บ ๐Ÿ‘‡

    youtu.be/c7he-teNdO8 #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  33. Drum roll please! ๐Ÿฅ๐Ÿฅ๐Ÿฅ Today we are excited to introduce the new Logs & Lattes podcast. ๐Ÿ’ฅ๐ŸŽ™๏ธ In this inaugural episode, Seth Goldhammer joins host Palmer Wallace to talk about the hidden cost of traditional #SIEM pricing. โ›” ๐Ÿ’ต ๐Ÿค”

    How much value are we really getting from our logs, and what are we giving up to stay on budget? Let's talk about how ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffsโ€”like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. ๐Ÿ˜“

    But, thereโ€™s a smarter way forward. ๐Ÿ˜ Learn how to escape this tradeoff trap and get the most out of your security data. Watch now! ๐Ÿ“บ ๐Ÿ‘‡

    youtu.be/c7he-teNdO8 #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  34. Drum roll please! ๐Ÿฅ๐Ÿฅ๐Ÿฅ Today we are excited to introduce the new Logs & Lattes podcast. ๐Ÿ’ฅ๐ŸŽ™๏ธ In this inaugural episode, Seth Goldhammer joins host Palmer Wallace to talk about the hidden cost of traditional #SIEM pricing. โ›” ๐Ÿ’ต ๐Ÿค”

    How much value are we really getting from our logs, and what are we giving up to stay on budget? Let's talk about how ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffsโ€”like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. ๐Ÿ˜“

    But, thereโ€™s a smarter way forward. ๐Ÿ˜ Learn how to escape this tradeoff trap and get the most out of your security data. Watch now! ๐Ÿ“บ ๐Ÿ‘‡

    youtu.be/c7he-teNdO8 #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  35. Drum roll please! ๐Ÿฅ๐Ÿฅ๐Ÿฅ Today we are excited to introduce the new Logs & Lattes podcast. ๐Ÿ’ฅ๐ŸŽ™๏ธ In this inaugural episode, Seth Goldhammer joins host Palmer Wallace to talk about the hidden cost of traditional #SIEM pricing. โ›” ๐Ÿ’ต ๐Ÿค”

    How much value are we really getting from our logs, and what are we giving up to stay on budget? Let's talk about how ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffsโ€”like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. ๐Ÿ˜“

    But, thereโ€™s a smarter way forward. ๐Ÿ˜ Learn how to escape this tradeoff trap and get the most out of your security data. Watch now! ๐Ÿ“บ ๐Ÿ‘‡

    youtu.be/c7he-teNdO8 #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  36. The world of #SIEM has changed! And, #Graylog's Seth Goldhammer is here to talk to you about what #security teams needs from SIEM today. ๐Ÿ“บ Watch and learn about:

    โ˜‘๏ธ What's broken with legacy SIEM
    โ˜‘๏ธ How you can get answers, not just alerts
    โ˜‘๏ธ Getting native AWS integration while operating in the cloud
    โ˜‘๏ธ Removing the bottleneck that slows you downโ€”by prioritizing alerts that matter
    โ˜‘๏ธ Reducing mean time to detect and mean time to respond
    โ˜‘๏ธ Moving from alert fatigue to action
    โ˜‘๏ธ How your security team can do more, with less

    Join Seth for this hot 10 Minute Take on smarter threat detection for AWS environments! ๐Ÿ‘‰ graylog.org/resources/graylog- #threatdetection #TDIR #cybersecurity #AWS

  37. The world of #SIEM has changed! And, #Graylog's Seth Goldhammer is here to talk to you about what #security teams needs from SIEM today. ๐Ÿ“บ Watch and learn about:

    โ˜‘๏ธ What's broken with legacy SIEM
    โ˜‘๏ธ How you can get answers, not just alerts
    โ˜‘๏ธ Getting native AWS integration while operating in the cloud
    โ˜‘๏ธ Removing the bottleneck that slows you downโ€”by prioritizing alerts that matter
    โ˜‘๏ธ Reducing mean time to detect and mean time to respond
    โ˜‘๏ธ Moving from alert fatigue to action
    โ˜‘๏ธ How your security team can do more, with less

    Join Seth for this hot 10 Minute Take on smarter threat detection for AWS environments! ๐Ÿ‘‰ graylog.org/resources/graylog- #threatdetection #TDIR #cybersecurity #AWS

  38. It's time to tune in for the latest from #GraylogLabs! ๐Ÿ“บ ๐ŸŽŠ Today we're taking about the new Caddy Webserver Content Pack. Say what? No, not #Caddyshack! โ›ณ ๐Ÿฆซ Caddy Webserver! ๐Ÿ–ฅ๏ธ

    This new content pack is going to help you quickly turn raw logs into structured, searchable insights. ๐Ÿ”Ž๐Ÿ’ก ๐Ÿ™Œ It's available in Illuminate 6.4 and a Graylog Enterprise or Graylog #Security license, and delivers ready-to-use parsing rules, streams, and dashboards. ๐Ÿšš

    Read up on:
    โ“ What this pack does
    ๐Ÿชต Getting logs into #Graylog
    ๐Ÿซต Why you should log Caddy Webserver logs
    ๐Ÿ” How this helps you quickly detect anomalies, identify suspicious requests, and feed relevant data directly into your #TDIR workflows

    graylog.org/post/caddy-webserv #cybersecurity #threatdetection #incidentresponse #SIEM

  39. It was a packed house for the Graylog #BSidesROC Capture The Flag on Saturday! ๐Ÿ  ๐ŸŽ‰ Thank you to everyone who joined us for the fun and games. ๐ŸŽฎ ๐Ÿ’ป You are all amazing and, now, a little (or a lot!) more knowledgable about #Graylog! ๐Ÿ’ก It's a win-win. ๐Ÿ˜ƒ ๐Ÿ‘

    And congrats to our challenge winners!
    ๐Ÿ† Grand prize winner โ€” Tyler Smith
    ๐ŸŽŸ๏ธ Training voucher winner โ€” Praveen Kumar Penukonda
    ๐Ÿ… Runner up โ€” Gabriel Schickling

    #CTF #cybersecurity #APIsecurity #SIEM #SIEMdoneright #GraylogCTF

  40. centralized log management - lots of options - have to do it - the only issues is that you find more issues to fix but that is a good thing #rsyslog #syslog-ng #graylog #forked versions

  41. centralized log management - lots of options - have to do it - the only issues is that you find more issues to fix but that is a good thing #rsyslog #syslog-ng #graylog #forked versions