#graylog โ Public Fediverse posts
Live and recent posts from across the Fediverse tagged #graylog, aggregated by home.social.
-
Graylog 7.1 just shipped
Auto-investigations from asset risk thresholds. One-click Slice-By triage. Anomaly detection plugged directly into your alert workflow.
May the 4th be with your alert queue.
See what's new: https://graylog.org/post/may-the-logs-be-with-you-graylog-7-1-is-here/
-
Collecting and analyzing log data becomes challenging in a multi-tiered architecture or a dynamic microservice environment. The LPI DevOps Tools Engineer 2.0 exam covers log management and analysis in objective 704.3.
Learn more from Fabian Thorns and Uirรก Ribeiro: https://lpi.org/5swa
#devops #logmanagement #observability #opensource #elasticsearch #graylog #promtail #loki #applicationlogging #systemlogging #kubernetes #syslog #linux #LPICertification
-
Grateful and humbled. Another RSA in the books, great conversations, and new hardware to show for it.
Thanks to all who stopped by and chatted with us.
-
Is your financial institution as safe as it could be from #ransomware and other cyber threats? ๐ค Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. ๐ฆ ๐ฐ
But have no fear, Graylog + Model Context Protocol (MCP) are here to help! ๐ฆธ๐ช Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources โ to enable threat detection content in their current #Graylog deployment.
See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.๐
https://graylog.org/post/how-to-use-mcp-to-optimize-your-graylog-security-detections/
-
Is your financial institution as safe as it could be from #ransomware and other cyber threats? ๐ค Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. ๐ฆ ๐ฐ
But have no fear, Graylog + Model Context Protocol (MCP) are here to help! ๐ฆธ๐ช Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources โ to enable threat detection content in their current #Graylog deployment.
See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.๐
https://graylog.org/post/how-to-use-mcp-to-optimize-your-graylog-security-detections/
-
Is your financial institution as safe as it could be from #ransomware and other cyber threats? ๐ค Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. ๐ฆ ๐ฐ
But have no fear, Graylog + Model Context Protocol (MCP) are here to help! ๐ฆธ๐ช Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources โ to enable threat detection content in their current #Graylog deployment.
See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.๐
https://graylog.org/post/how-to-use-mcp-to-optimize-your-graylog-security-detections/
-
Is your financial institution as safe as it could be from #ransomware and other cyber threats? ๐ค Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. ๐ฆ ๐ฐ
But have no fear, Graylog + Model Context Protocol (MCP) are here to help! ๐ฆธ๐ช Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources โ to enable threat detection content in their current #Graylog deployment.
See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.๐
https://graylog.org/post/how-to-use-mcp-to-optimize-your-graylog-security-detections/
-
Is your financial institution as safe as it could be from #ransomware and other cyber threats? ๐ค Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. ๐ฆ ๐ฐ
But have no fear, Graylog + Model Context Protocol (MCP) are here to help! ๐ฆธ๐ช Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources โ to enable threat detection content in their current #Graylog deployment.
See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.๐
https://graylog.org/post/how-to-use-mcp-to-optimize-your-graylog-security-detections/
-
#Graylog 7.0 is out, and Ethan C. Keaton's avatar is here to show you how to upgrade! ๐ฅ Whether you're running a small log server or managing an enterprise cluster, keeping Graylog up to date means better performance, stronger #security, and access to the latest features. ๐
Watch now and get help with preparing your system, upgrading MongoDB and Data Node safely, and more. Ready to get it done without breaking your setup? ๐ Let's go! ๐
๐บ https://www.youtube.com/watch?v=uWZlC5DY9WA #CyberSecurity #LogManagement #SIEM #TDIR
-
#Graylog 7.0 is out, and Ethan C. Keaton's avatar is here to show you how to upgrade! ๐ฅ Whether you're running a small log server or managing an enterprise cluster, keeping Graylog up to date means better performance, stronger #security, and access to the latest features. ๐
Watch now and get help with preparing your system, upgrading MongoDB and Data Node safely, and more. Ready to get it done without breaking your setup? ๐ Let's go! ๐
๐บ https://www.youtube.com/watch?v=uWZlC5DY9WA #CyberSecurity #LogManagement #SIEM #TDIR
-
#Graylog 7.0 is out, and Ethan C. Keaton's avatar is here to show you how to upgrade! ๐ฅ Whether you're running a small log server or managing an enterprise cluster, keeping Graylog up to date means better performance, stronger #security, and access to the latest features. ๐
Watch now and get help with preparing your system, upgrading MongoDB and Data Node safely, and more. Ready to get it done without breaking your setup? ๐ Let's go! ๐
๐บ https://www.youtube.com/watch?v=uWZlC5DY9WA #CyberSecurity #LogManagement #SIEM #TDIR
-
#Graylog 7.0 is out, and Ethan C. Keaton's avatar is here to show you how to upgrade! ๐ฅ Whether you're running a small log server or managing an enterprise cluster, keeping Graylog up to date means better performance, stronger #security, and access to the latest features. ๐
Watch now and get help with preparing your system, upgrading MongoDB and Data Node safely, and more. Ready to get it done without breaking your setup? ๐ Let's go! ๐
๐บ https://www.youtube.com/watch?v=uWZlC5DY9WA #CyberSecurity #LogManagement #SIEM #TDIR
-
#Graylog 7.0 is out, and Ethan C. Keaton's avatar is here to show you how to upgrade! ๐ฅ Whether you're running a small log server or managing an enterprise cluster, keeping Graylog up to date means better performance, stronger #security, and access to the latest features. ๐
Watch now and get help with preparing your system, upgrading MongoDB and Data Node safely, and more. Ready to get it done without breaking your setup? ๐ Let's go! ๐
๐บ https://www.youtube.com/watch?v=uWZlC5DY9WA #CyberSecurity #LogManagement #SIEM #TDIR
-
On-tap for today we have... detection chains! ๐โ๏ธ๐ฅ On your #Graylog Security Events page, there is a new badge for events that are detection chainsโor as we like to call them "attack campaigns".
Wondering what a detection chain looks like in #Graylog? ๐ค Rich Murphy, Director of Product Management for #Security at Graylog, will show you. ๐๐
https://www.youtube.com/watch?v=tCM_8SEXUuw #CyberSecurity #SIEM #APISecurity
-
Welcome to November, the end of daylight savings time, and everything "T-Day" for the next four weeks! In the spirit of this month we've got a feast of new features, a cornucopia of new capabilities and a banquet of breakthroughs to share with you. ๐ฆ ๐ซต Introducing #Graylog 7.0! ๐
Let's take a look at the new improvements across dashboards, automation, and #AI support. There are four key ingredients in this 7.0 #Thanksgiving feast:
๐ก Smarter Dashboards that deliver faster, more meaningful insights
๐ ๏ธ Guided Remediation that ensures consistent, reliable action
๐ฒ Cost-efficient Data Lake Integration that simplifies cloud management
๐ค Native MCP Support that brings intelligent collaboration to every investigationReady to learn more? Take a look at the menu and more, in this article by Seth Goldhammer.
https://graylog.org/post/gobbling-up-insights-graylog-7-0-serves-up-a-feast/ #CyberSecurity #SIEM #APISecurity #TDIR
-
Welcome to November, the end of daylight savings time, and everything "T-Day" for the next four weeks! In the spirit of this month we've got a feast of new features, a cornucopia of new capabilities and a banquet of breakthroughs to share with you. ๐ฆ ๐ซต Introducing #Graylog 7.0! ๐
Let's take a look at the new improvements across dashboards, automation, and #AI support. There are four key ingredients in this 7.0 #Thanksgiving feast:
๐ก Smarter Dashboards that deliver faster, more meaningful insights
๐ ๏ธ Guided Remediation that ensures consistent, reliable action
๐ฒ Cost-efficient Data Lake Integration that simplifies cloud management
๐ค Native MCP Support that brings intelligent collaboration to every investigationReady to learn more? Take a look at the menu and more, in this article by Seth Goldhammer.
https://graylog.org/post/gobbling-up-insights-graylog-7-0-serves-up-a-feast/ #CyberSecurity #SIEM #APISecurity #TDIR
-
Welcome to November, the end of daylight savings time, and everything "T-Day" for the next four weeks! In the spirit of this month we've got a feast of new features, a cornucopia of new capabilities and a banquet of breakthroughs to share with you. ๐ฆ ๐ซต Introducing #Graylog 7.0! ๐
Let's take a look at the new improvements across dashboards, automation, and #AI support. There are four key ingredients in this 7.0 #Thanksgiving feast:
๐ก Smarter Dashboards that deliver faster, more meaningful insights
๐ ๏ธ Guided Remediation that ensures consistent, reliable action
๐ฒ Cost-efficient Data Lake Integration that simplifies cloud management
๐ค Native MCP Support that brings intelligent collaboration to every investigationReady to learn more? Take a look at the menu and more, in this article by Seth Goldhammer.
https://graylog.org/post/gobbling-up-insights-graylog-7-0-serves-up-a-feast/ #CyberSecurity #SIEM #APISecurity #TDIR
-
Welcome to November, the end of daylight savings time, and everything "T-Day" for the next four weeks! In the spirit of this month we've got a feast of new features, a cornucopia of new capabilities and a banquet of breakthroughs to share with you. ๐ฆ ๐ซต Introducing #Graylog 7.0! ๐
Let's take a look at the new improvements across dashboards, automation, and #AI support. There are four key ingredients in this 7.0 #Thanksgiving feast:
๐ก Smarter Dashboards that deliver faster, more meaningful insights
๐ ๏ธ Guided Remediation that ensures consistent, reliable action
๐ฒ Cost-efficient Data Lake Integration that simplifies cloud management
๐ค Native MCP Support that brings intelligent collaboration to every investigationReady to learn more? Take a look at the menu and more, in this article by Seth Goldhammer.
https://graylog.org/post/gobbling-up-insights-graylog-7-0-serves-up-a-feast/ #CyberSecurity #SIEM #APISecurity #TDIR
-
Welcome to November, the end of daylight savings time, and everything "T-Day" for the next four weeks! In the spirit of this month we've got a feast of new features, a cornucopia of new capabilities and a banquet of breakthroughs to share with you. ๐ฆ ๐ซต Introducing #Graylog 7.0! ๐
Let's take a look at the new improvements across dashboards, automation, and #AI support. There are four key ingredients in this 7.0 #Thanksgiving feast:
๐ก Smarter Dashboards that deliver faster, more meaningful insights
๐ ๏ธ Guided Remediation that ensures consistent, reliable action
๐ฒ Cost-efficient Data Lake Integration that simplifies cloud management
๐ค Native MCP Support that brings intelligent collaboration to every investigationReady to learn more? Take a look at the menu and more, in this article by Seth Goldhammer.
https://graylog.org/post/gobbling-up-insights-graylog-7-0-serves-up-a-feast/ #CyberSecurity #SIEM #APISecurity #TDIR
-
With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffsโlike dropping logs, tuning down detections, or limiting retention just to avoid budget overages. ๐ธ
But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. ๐ฑ Seriously... when you drop data, you drop context! ๐ And, missing context can turn a minor oversight into a major blind spot. ๐
Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. ๐ก
https://www.youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffsโlike dropping logs, tuning down detections, or limiting retention just to avoid budget overages. ๐ธ
But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. ๐ฑ Seriously... when you drop data, you drop context! ๐ And, missing context can turn a minor oversight into a major blind spot. ๐
Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. ๐ก
https://www.youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffsโlike dropping logs, tuning down detections, or limiting retention just to avoid budget overages. ๐ธ
But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. ๐ฑ Seriously... when you drop data, you drop context! ๐ And, missing context can turn a minor oversight into a major blind spot. ๐
Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. ๐ก
https://www.youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffsโlike dropping logs, tuning down detections, or limiting retention just to avoid budget overages. ๐ธ
But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. ๐ฑ Seriously... when you drop data, you drop context! ๐ And, missing context can turn a minor oversight into a major blind spot. ๐
Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. ๐ก
https://www.youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffsโlike dropping logs, tuning down detections, or limiting retention just to avoid budget overages. ๐ธ
But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. ๐ฑ Seriously... when you drop data, you drop context! ๐ And, missing context can turn a minor oversight into a major blind spot. ๐
Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. ๐ก
https://www.youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
๐กIt's time to learn about some features and fixes that will make your daily work in #Graylog smoother. ๐ In our most recent blog by the Graylog Development Team, we're highlighting a minor but functional enhancement โ Graylog time-range stepping.
To fix manual time-range adjustment limitations we now have two new time range navigation buttons that let you step forward and backward through your logs, one time range at a time. โฌ ๏ธ โก๏ธ Learn more about this feature here: https://graylog.org/post/sliding-through-log-time-space/
๐ป And, stay tuned for more in this series from Konrad Merz and the rest of the Graylog Development Team! #CyberSecurity #SIEM #APISecurity #GraylogLabs
-
Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! ๐ชต โ This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action โ and get smarter security ops that reduce risk. โฌ๏ธ โ ๏ธ
From alert fatigue to risk-first response, let's unpack practical ways you can:
โ๏ธ Prioritize real threats
โ๏ธ Automate with context
โ๏ธ Make incident response faster & more effective
โ๏ธ Make SOAR useful for lean teamsIn this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.
๐บ ๐ https://youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! ๐ชต โ This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action โ and get smarter security ops that reduce risk. โฌ๏ธ โ ๏ธ
From alert fatigue to risk-first response, let's unpack practical ways you can:
โ๏ธ Prioritize real threats
โ๏ธ Automate with context
โ๏ธ Make incident response faster & more effective
โ๏ธ Make SOAR useful for lean teamsIn this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.
๐บ ๐ https://youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! ๐ชต โ This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action โ and get smarter security ops that reduce risk. โฌ๏ธ โ ๏ธ
From alert fatigue to risk-first response, let's unpack practical ways you can:
โ๏ธ Prioritize real threats
โ๏ธ Automate with context
โ๏ธ Make incident response faster & more effective
โ๏ธ Make SOAR useful for lean teamsIn this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.
๐บ ๐ https://youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! ๐ชต โ This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action โ and get smarter security ops that reduce risk. โฌ๏ธ โ ๏ธ
From alert fatigue to risk-first response, let's unpack practical ways you can:
โ๏ธ Prioritize real threats
โ๏ธ Automate with context
โ๏ธ Make incident response faster & more effective
โ๏ธ Make SOAR useful for lean teamsIn this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.
๐บ ๐ https://youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! ๐ชต โ This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action โ and get smarter security ops that reduce risk. โฌ๏ธ โ ๏ธ
From alert fatigue to risk-first response, let's unpack practical ways you can:
โ๏ธ Prioritize real threats
โ๏ธ Automate with context
โ๏ธ Make incident response faster & more effective
โ๏ธ Make SOAR useful for lean teamsIn this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.
๐บ ๐ https://youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
Drum roll please! ๐ฅ๐ฅ๐ฅ Today we are excited to introduce the new Logs & Lattes podcast. ๐ฅ๐๏ธ In this inaugural episode, Seth Goldhammer joins host Palmer Wallace to talk about the hidden cost of traditional #SIEM pricing. โ ๐ต ๐ค
How much value are we really getting from our logs, and what are we giving up to stay on budget? Let's talk about how ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffsโlike dropping logs, tuning down detections, or limiting retention just to avoid budget overages. ๐
But, thereโs a smarter way forward. ๐ Learn how to escape this tradeoff trap and get the most out of your security data. Watch now! ๐บ ๐
https://youtu.be/c7he-teNdO8 #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
Drum roll please! ๐ฅ๐ฅ๐ฅ Today we are excited to introduce the new Logs & Lattes podcast. ๐ฅ๐๏ธ In this inaugural episode, Seth Goldhammer joins host Palmer Wallace to talk about the hidden cost of traditional #SIEM pricing. โ ๐ต ๐ค
How much value are we really getting from our logs, and what are we giving up to stay on budget? Let's talk about how ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffsโlike dropping logs, tuning down detections, or limiting retention just to avoid budget overages. ๐
But, thereโs a smarter way forward. ๐ Learn how to escape this tradeoff trap and get the most out of your security data. Watch now! ๐บ ๐
https://youtu.be/c7he-teNdO8 #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
Drum roll please! ๐ฅ๐ฅ๐ฅ Today we are excited to introduce the new Logs & Lattes podcast. ๐ฅ๐๏ธ In this inaugural episode, Seth Goldhammer joins host Palmer Wallace to talk about the hidden cost of traditional #SIEM pricing. โ ๐ต ๐ค
How much value are we really getting from our logs, and what are we giving up to stay on budget? Let's talk about how ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffsโlike dropping logs, tuning down detections, or limiting retention just to avoid budget overages. ๐
But, thereโs a smarter way forward. ๐ Learn how to escape this tradeoff trap and get the most out of your security data. Watch now! ๐บ ๐
https://youtu.be/c7he-teNdO8 #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
Drum roll please! ๐ฅ๐ฅ๐ฅ Today we are excited to introduce the new Logs & Lattes podcast. ๐ฅ๐๏ธ In this inaugural episode, Seth Goldhammer joins host Palmer Wallace to talk about the hidden cost of traditional #SIEM pricing. โ ๐ต ๐ค
How much value are we really getting from our logs, and what are we giving up to stay on budget? Let's talk about how ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffsโlike dropping logs, tuning down detections, or limiting retention just to avoid budget overages. ๐
But, thereโs a smarter way forward. ๐ Learn how to escape this tradeoff trap and get the most out of your security data. Watch now! ๐บ ๐
https://youtu.be/c7he-teNdO8 #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
Drum roll please! ๐ฅ๐ฅ๐ฅ Today we are excited to introduce the new Logs & Lattes podcast. ๐ฅ๐๏ธ In this inaugural episode, Seth Goldhammer joins host Palmer Wallace to talk about the hidden cost of traditional #SIEM pricing. โ ๐ต ๐ค
How much value are we really getting from our logs, and what are we giving up to stay on budget? Let's talk about how ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffsโlike dropping logs, tuning down detections, or limiting retention just to avoid budget overages. ๐
But, thereโs a smarter way forward. ๐ Learn how to escape this tradeoff trap and get the most out of your security data. Watch now! ๐บ ๐
https://youtu.be/c7he-teNdO8 #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
The world of #SIEM has changed! And, #Graylog's Seth Goldhammer is here to talk to you about what #security teams needs from SIEM today. ๐บ Watch and learn about:
โ๏ธ What's broken with legacy SIEM
โ๏ธ How you can get answers, not just alerts
โ๏ธ Getting native AWS integration while operating in the cloud
โ๏ธ Removing the bottleneck that slows you downโby prioritizing alerts that matter
โ๏ธ Reducing mean time to detect and mean time to respond
โ๏ธ Moving from alert fatigue to action
โ๏ธ How your security team can do more, with lessJoin Seth for this hot 10 Minute Take on smarter threat detection for AWS environments! ๐ https://graylog.org/resources/graylog-siem-on-aws/ #threatdetection #TDIR #cybersecurity #AWS
-
The world of #SIEM has changed! And, #Graylog's Seth Goldhammer is here to talk to you about what #security teams needs from SIEM today. ๐บ Watch and learn about:
โ๏ธ What's broken with legacy SIEM
โ๏ธ How you can get answers, not just alerts
โ๏ธ Getting native AWS integration while operating in the cloud
โ๏ธ Removing the bottleneck that slows you downโby prioritizing alerts that matter
โ๏ธ Reducing mean time to detect and mean time to respond
โ๏ธ Moving from alert fatigue to action
โ๏ธ How your security team can do more, with lessJoin Seth for this hot 10 Minute Take on smarter threat detection for AWS environments! ๐ https://graylog.org/resources/graylog-siem-on-aws/ #threatdetection #TDIR #cybersecurity #AWS
-
It's time to tune in for the latest from #GraylogLabs! ๐บ ๐ Today we're taking about the new Caddy Webserver Content Pack. Say what? No, not #Caddyshack! โณ ๐ฆซ Caddy Webserver! ๐ฅ๏ธ
This new content pack is going to help you quickly turn raw logs into structured, searchable insights. ๐๐ก ๐ It's available in Illuminate 6.4 and a Graylog Enterprise or Graylog #Security license, and delivers ready-to-use parsing rules, streams, and dashboards. ๐
Read up on:
โ What this pack does
๐ชต Getting logs into #Graylog
๐ซต Why you should log Caddy Webserver logs
๐ How this helps you quickly detect anomalies, identify suspicious requests, and feed relevant data directly into your #TDIR workflowshttps://graylog.org/post/caddy-webserver-data-in-graylog/ #cybersecurity #threatdetection #incidentresponse #SIEM
-
It was a packed house for the Graylog #BSidesROC Capture The Flag on Saturday! ๐ ๐ Thank you to everyone who joined us for the fun and games. ๐ฎ ๐ป You are all amazing and, now, a little (or a lot!) more knowledgable about #Graylog! ๐ก It's a win-win. ๐ ๐
And congrats to our challenge winners!
๐ Grand prize winner โ Tyler Smith
๐๏ธ Training voucher winner โ Praveen Kumar Penukonda
๐ Runner up โ Gabriel Schickling#CTF #cybersecurity #APIsecurity #SIEM #SIEMdoneright #GraylogCTF