home.social

#tdir — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #tdir, aggregated by home.social.

  1. Are you using your #SIEM to detect #security threats in the most efficient and effective ways possible❓🤔 When you implement and fine-tune SIEM detections, you strengthen your security posture and become better able to strategically aligning with your business objectives.

    Fine-tuning your SIEM detections specifically allows you to:
    💡 Improve threat detection with smarter correlation
    ⬆️ Accelerate incident response
    👀 Gain comprehensive visibility into your environment
    ☑️ Enable compliance and audit readiness
    😌 Reduce alert fatigue

    Read on, to learn about 6 specific steps you can take that will help you build fine-tuned detections and high-fidelity alerts.👇

    graylog.org/post/6-steps-for-u #ThreatDetection #IncidentResponse #TDIR #CyberSecurity

  2. Are you using your #SIEM to detect #security threats in the most efficient and effective ways possible❓🤔 When you implement and fine-tune SIEM detections, you strengthen your security posture and become better able to strategically aligning with your business objectives.

    Fine-tuning your SIEM detections specifically allows you to:
    💡 Improve threat detection with smarter correlation
    ⬆️ Accelerate incident response
    👀 Gain comprehensive visibility into your environment
    ☑️ Enable compliance and audit readiness
    😌 Reduce alert fatigue

    Read on, to learn about 6 specific steps you can take that will help you build fine-tuned detections and high-fidelity alerts.👇

    graylog.org/post/6-steps-for-u #ThreatDetection #IncidentResponse #TDIR #CyberSecurity

  3. Are you using your #SIEM to detect #security threats in the most efficient and effective ways possible❓🤔 When you implement and fine-tune SIEM detections, you strengthen your security posture and become better able to strategically aligning with your business objectives.

    Fine-tuning your SIEM detections specifically allows you to:
    💡 Improve threat detection with smarter correlation
    ⬆️ Accelerate incident response
    👀 Gain comprehensive visibility into your environment
    ☑️ Enable compliance and audit readiness
    😌 Reduce alert fatigue

    Read on, to learn about 6 specific steps you can take that will help you build fine-tuned detections and high-fidelity alerts.👇

    graylog.org/post/6-steps-for-u #ThreatDetection #IncidentResponse #TDIR #CyberSecurity

  4. Are you using your #SIEM to detect #security threats in the most efficient and effective ways possible❓🤔 When you implement and fine-tune SIEM detections, you strengthen your security posture and become better able to strategically aligning with your business objectives.

    Fine-tuning your SIEM detections specifically allows you to:
    💡 Improve threat detection with smarter correlation
    ⬆️ Accelerate incident response
    👀 Gain comprehensive visibility into your environment
    ☑️ Enable compliance and audit readiness
    😌 Reduce alert fatigue

    Read on, to learn about 6 specific steps you can take that will help you build fine-tuned detections and high-fidelity alerts.👇

    graylog.org/post/6-steps-for-u #ThreatDetection #IncidentResponse #TDIR #CyberSecurity

  5. Are you using your #SIEM to detect #security threats in the most efficient and effective ways possible❓🤔 When you implement and fine-tune SIEM detections, you strengthen your security posture and become better able to strategically aligning with your business objectives.

    Fine-tuning your SIEM detections specifically allows you to:
    💡 Improve threat detection with smarter correlation
    ⬆️ Accelerate incident response
    👀 Gain comprehensive visibility into your environment
    ☑️ Enable compliance and audit readiness
    😌 Reduce alert fatigue

    Read on, to learn about 6 specific steps you can take that will help you build fine-tuned detections and high-fidelity alerts.👇

    graylog.org/post/6-steps-for-u #ThreatDetection #IncidentResponse #TDIR #CyberSecurity

  6. Is your financial institution as safe as it could be from #ransomware and other cyber threats? 🤔 Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. 🏦 💰

    But have no fear, Graylog + Model Context Protocol (MCP) are here to help! 🦸💪 Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources — to enable threat detection content in their current #Graylog deployment.

    See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.👇

    graylog.org/post/how-to-use-mc

    #CyberThreats #FinServ #GraylogLabs #TDIR #ThreatDetection

  7. Is your financial institution as safe as it could be from #ransomware and other cyber threats? 🤔 Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. 🏦 💰

    But have no fear, Graylog + Model Context Protocol (MCP) are here to help! 🦸💪 Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources — to enable threat detection content in their current #Graylog deployment.

    See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.👇

    graylog.org/post/how-to-use-mc

    #CyberThreats #FinServ #GraylogLabs #TDIR #ThreatDetection

  8. Is your financial institution as safe as it could be from #ransomware and other cyber threats? 🤔 Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. 🏦 💰

    But have no fear, Graylog + Model Context Protocol (MCP) are here to help! 🦸💪 Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources — to enable threat detection content in their current #Graylog deployment.

    See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.👇

    graylog.org/post/how-to-use-mc

    #CyberThreats #FinServ #GraylogLabs #TDIR #ThreatDetection

  9. Is your financial institution as safe as it could be from #ransomware and other cyber threats? 🤔 Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. 🏦 💰

    But have no fear, Graylog + Model Context Protocol (MCP) are here to help! 🦸💪 Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources — to enable threat detection content in their current #Graylog deployment.

    See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.👇

    graylog.org/post/how-to-use-mc

    #CyberThreats #FinServ #GraylogLabs #TDIR #ThreatDetection

  10. Is your financial institution as safe as it could be from #ransomware and other cyber threats? 🤔 Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. 🏦 💰

    But have no fear, Graylog + Model Context Protocol (MCP) are here to help! 🦸💪 Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources — to enable threat detection content in their current #Graylog deployment.

    See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.👇

    graylog.org/post/how-to-use-mc

    #CyberThreats #FinServ #GraylogLabs #TDIR #ThreatDetection

  11. Data lakes are typically thought of as simple warehouses. But they don't have to be! 👀 In Graylog 7.0 data lakes function as pressure release valves for #security teams overwhelmed by storage costs, investigation delays, and cloud data sprawl — where analysts can get direct access to long term data, and more.

    Our data lake provides inexpensive storage where logs stay searchable, preview-able, and recoverable. Learn more about getting cloud scale without cloud surprises, and why this is a truly practical stance on managing data volume.

    graylog.org/post/how-to-use-da #CyberSecurity #SEIM #DataLake #TDIR

  12. Data lakes are typically thought of as simple warehouses. But they don't have to be! 👀 In Graylog 7.0 data lakes function as pressure release valves for #security teams overwhelmed by storage costs, investigation delays, and cloud data sprawl — where analysts can get direct access to long term data, and more.

    Our data lake provides inexpensive storage where logs stay searchable, preview-able, and recoverable. Learn more about getting cloud scale without cloud surprises, and why this is a truly practical stance on managing data volume.

    graylog.org/post/how-to-use-da #CyberSecurity #SEIM #DataLake #TDIR

  13. Data lakes are typically thought of as simple warehouses. But they don't have to be! 👀 In Graylog 7.0 data lakes function as pressure release valves for #security teams overwhelmed by storage costs, investigation delays, and cloud data sprawl — where analysts can get direct access to long term data, and more.

    Our data lake provides inexpensive storage where logs stay searchable, preview-able, and recoverable. Learn more about getting cloud scale without cloud surprises, and why this is a truly practical stance on managing data volume.

    graylog.org/post/how-to-use-da #CyberSecurity #SEIM #DataLake #TDIR

  14. Data lakes are typically thought of as simple warehouses. But they don't have to be! 👀 In Graylog 7.0 data lakes function as pressure release valves for #security teams overwhelmed by storage costs, investigation delays, and cloud data sprawl — where analysts can get direct access to long term data, and more.

    Our data lake provides inexpensive storage where logs stay searchable, preview-able, and recoverable. Learn more about getting cloud scale without cloud surprises, and why this is a truly practical stance on managing data volume.

    graylog.org/post/how-to-use-da #CyberSecurity #SEIM #DataLake #TDIR

  15. Data lakes are typically thought of as simple warehouses. But they don't have to be! 👀 In Graylog 7.0 data lakes function as pressure release valves for #security teams overwhelmed by storage costs, investigation delays, and cloud data sprawl — where analysts can get direct access to long term data, and more.

    Our data lake provides inexpensive storage where logs stay searchable, preview-able, and recoverable. Learn more about getting cloud scale without cloud surprises, and why this is a truly practical stance on managing data volume.

    graylog.org/post/how-to-use-da #CyberSecurity #SEIM #DataLake #TDIR

  16. #Graylog 7.0 is out, and Ethan C. Keaton's avatar is here to show you how to upgrade! 💥 Whether you're running a small log server or managing an enterprise cluster, keeping Graylog up to date means better performance, stronger #security, and access to the latest features. 👍

    Watch now and get help with preparing your system, upgrading MongoDB and Data Node safely, and more. Ready to get it done without breaking your setup? 👀 Let's go! 👇

    📺 youtube.com/watch?v=uWZlC5DY9WA #CyberSecurity #LogManagement #SIEM #TDIR

  17. #Graylog 7.0 is out, and Ethan C. Keaton's avatar is here to show you how to upgrade! 💥 Whether you're running a small log server or managing an enterprise cluster, keeping Graylog up to date means better performance, stronger #security, and access to the latest features. 👍

    Watch now and get help with preparing your system, upgrading MongoDB and Data Node safely, and more. Ready to get it done without breaking your setup? 👀 Let's go! 👇

    📺 youtube.com/watch?v=uWZlC5DY9WA #CyberSecurity #LogManagement #SIEM #TDIR

  18. #Graylog 7.0 is out, and Ethan C. Keaton's avatar is here to show you how to upgrade! 💥 Whether you're running a small log server or managing an enterprise cluster, keeping Graylog up to date means better performance, stronger #security, and access to the latest features. 👍

    Watch now and get help with preparing your system, upgrading MongoDB and Data Node safely, and more. Ready to get it done without breaking your setup? 👀 Let's go! 👇

    📺 youtube.com/watch?v=uWZlC5DY9WA #CyberSecurity #LogManagement #SIEM #TDIR

  19. #Graylog 7.0 is out, and Ethan C. Keaton's avatar is here to show you how to upgrade! 💥 Whether you're running a small log server or managing an enterprise cluster, keeping Graylog up to date means better performance, stronger #security, and access to the latest features. 👍

    Watch now and get help with preparing your system, upgrading MongoDB and Data Node safely, and more. Ready to get it done without breaking your setup? 👀 Let's go! 👇

    📺 youtube.com/watch?v=uWZlC5DY9WA #CyberSecurity #LogManagement #SIEM #TDIR

  20. #Graylog 7.0 is out, and Ethan C. Keaton's avatar is here to show you how to upgrade! 💥 Whether you're running a small log server or managing an enterprise cluster, keeping Graylog up to date means better performance, stronger #security, and access to the latest features. 👍

    Watch now and get help with preparing your system, upgrading MongoDB and Data Node safely, and more. Ready to get it done without breaking your setup? 👀 Let's go! 👇

    📺 youtube.com/watch?v=uWZlC5DY9WA #CyberSecurity #LogManagement #SIEM #TDIR

  21. Are you working on building an efficient SOC? We can help! 🙌 It's important to start by developing a strategy—as your #security goals must align with business objectives. 💡 In our latest blog, we outline and detail 7 key steps to follow for SOC success. ⭐ They include:

    1️⃣ Developing the strategy
    2️⃣ Designing the solution
    3️⃣ Developing processes, procedures, & training
    4️⃣ Investing in tools & services to fill gaps
    5️⃣ Preparing your environment
    6️⃣ Implementing the solution
    7️⃣ Deploying end-to-end use cases

    Read on to learn more about these 7 key steps along with roles and responsibilities of SOC team members, and more.

    graylog.org/post/7-steps-to-an #CyberSecurity #SIEM #TDIR #APISecurity #SecurityOperations

  22. Are you working on building an efficient SOC? We can help! 🙌 It's important to start by developing a strategy—as your #security goals must align with business objectives. 💡 In our latest blog, we outline and detail 7 key steps to follow for SOC success. ⭐ They include:

    1️⃣ Developing the strategy
    2️⃣ Designing the solution
    3️⃣ Developing processes, procedures, & training
    4️⃣ Investing in tools & services to fill gaps
    5️⃣ Preparing your environment
    6️⃣ Implementing the solution
    7️⃣ Deploying end-to-end use cases

    Read on to learn more about these 7 key steps along with roles and responsibilities of SOC team members, and more.

    graylog.org/post/7-steps-to-an #CyberSecurity #SIEM #TDIR #APISecurity #SecurityOperations

  23. Are you working on building an efficient SOC? We can help! 🙌 It's important to start by developing a strategy—as your #security goals must align with business objectives. 💡 In our latest blog, we outline and detail 7 key steps to follow for SOC success. ⭐ They include:

    1️⃣ Developing the strategy
    2️⃣ Designing the solution
    3️⃣ Developing processes, procedures, & training
    4️⃣ Investing in tools & services to fill gaps
    5️⃣ Preparing your environment
    6️⃣ Implementing the solution
    7️⃣ Deploying end-to-end use cases

    Read on to learn more about these 7 key steps along with roles and responsibilities of SOC team members, and more.

    graylog.org/post/7-steps-to-an #CyberSecurity #SIEM #TDIR #APISecurity #SecurityOperations

  24. Are you working on building an efficient SOC? We can help! 🙌 It's important to start by developing a strategy—as your #security goals must align with business objectives. 💡 In our latest blog, we outline and detail 7 key steps to follow for SOC success. ⭐ They include:

    1️⃣ Developing the strategy
    2️⃣ Designing the solution
    3️⃣ Developing processes, procedures, & training
    4️⃣ Investing in tools & services to fill gaps
    5️⃣ Preparing your environment
    6️⃣ Implementing the solution
    7️⃣ Deploying end-to-end use cases

    Read on to learn more about these 7 key steps along with roles and responsibilities of SOC team members, and more.

    graylog.org/post/7-steps-to-an #CyberSecurity #SIEM #TDIR #APISecurity #SecurityOperations

  25. Are you working on building an efficient SOC? We can help! 🙌 It's important to start by developing a strategy—as your #security goals must align with business objectives. 💡 In our latest blog, we outline and detail 7 key steps to follow for SOC success. ⭐ They include:

    1️⃣ Developing the strategy
    2️⃣ Designing the solution
    3️⃣ Developing processes, procedures, & training
    4️⃣ Investing in tools & services to fill gaps
    5️⃣ Preparing your environment
    6️⃣ Implementing the solution
    7️⃣ Deploying end-to-end use cases

    Read on to learn more about these 7 key steps along with roles and responsibilities of SOC team members, and more.

    graylog.org/post/7-steps-to-an #CyberSecurity #SIEM #TDIR #APISecurity #SecurityOperations

  26. Welcome to November, the end of daylight savings time, and everything "T-Day" for the next four weeks! In the spirit of this month we've got a feast of new features, a cornucopia of new capabilities and a banquet of breakthroughs to share with you. 🦃 🫵 Introducing #Graylog 7.0! 🎊

    Let's take a look at the new improvements across dashboards, automation, and #AI support. There are four key ingredients in this 7.0 #Thanksgiving feast:

    💡 Smarter Dashboards that deliver faster, more meaningful insights
    🛠️ Guided Remediation that ensures consistent, reliable action
    💲 Cost-efficient Data Lake Integration that simplifies cloud management
    🤝 Native MCP Support that brings intelligent collaboration to every investigation

    Ready to learn more? Take a look at the menu and more, in this article by Seth Goldhammer.

    graylog.org/post/gobbling-up-i #CyberSecurity #SIEM #APISecurity #TDIR

  27. Welcome to November, the end of daylight savings time, and everything "T-Day" for the next four weeks! In the spirit of this month we've got a feast of new features, a cornucopia of new capabilities and a banquet of breakthroughs to share with you. 🦃 🫵 Introducing #Graylog 7.0! 🎊

    Let's take a look at the new improvements across dashboards, automation, and #AI support. There are four key ingredients in this 7.0 #Thanksgiving feast:

    💡 Smarter Dashboards that deliver faster, more meaningful insights
    🛠️ Guided Remediation that ensures consistent, reliable action
    💲 Cost-efficient Data Lake Integration that simplifies cloud management
    🤝 Native MCP Support that brings intelligent collaboration to every investigation

    Ready to learn more? Take a look at the menu and more, in this article by Seth Goldhammer.

    graylog.org/post/gobbling-up-i #CyberSecurity #SIEM #APISecurity #TDIR

  28. Welcome to November, the end of daylight savings time, and everything "T-Day" for the next four weeks! In the spirit of this month we've got a feast of new features, a cornucopia of new capabilities and a banquet of breakthroughs to share with you. 🦃 🫵 Introducing #Graylog 7.0! 🎊

    Let's take a look at the new improvements across dashboards, automation, and #AI support. There are four key ingredients in this 7.0 #Thanksgiving feast:

    💡 Smarter Dashboards that deliver faster, more meaningful insights
    🛠️ Guided Remediation that ensures consistent, reliable action
    💲 Cost-efficient Data Lake Integration that simplifies cloud management
    🤝 Native MCP Support that brings intelligent collaboration to every investigation

    Ready to learn more? Take a look at the menu and more, in this article by Seth Goldhammer.

    graylog.org/post/gobbling-up-i #CyberSecurity #SIEM #APISecurity #TDIR

  29. Welcome to November, the end of daylight savings time, and everything "T-Day" for the next four weeks! In the spirit of this month we've got a feast of new features, a cornucopia of new capabilities and a banquet of breakthroughs to share with you. 🦃 🫵 Introducing #Graylog 7.0! 🎊

    Let's take a look at the new improvements across dashboards, automation, and #AI support. There are four key ingredients in this 7.0 #Thanksgiving feast:

    💡 Smarter Dashboards that deliver faster, more meaningful insights
    🛠️ Guided Remediation that ensures consistent, reliable action
    💲 Cost-efficient Data Lake Integration that simplifies cloud management
    🤝 Native MCP Support that brings intelligent collaboration to every investigation

    Ready to learn more? Take a look at the menu and more, in this article by Seth Goldhammer.

    graylog.org/post/gobbling-up-i #CyberSecurity #SIEM #APISecurity #TDIR

  30. Welcome to November, the end of daylight savings time, and everything "T-Day" for the next four weeks! In the spirit of this month we've got a feast of new features, a cornucopia of new capabilities and a banquet of breakthroughs to share with you. 🦃 🫵 Introducing #Graylog 7.0! 🎊

    Let's take a look at the new improvements across dashboards, automation, and #AI support. There are four key ingredients in this 7.0 #Thanksgiving feast:

    💡 Smarter Dashboards that deliver faster, more meaningful insights
    🛠️ Guided Remediation that ensures consistent, reliable action
    💲 Cost-efficient Data Lake Integration that simplifies cloud management
    🤝 Native MCP Support that brings intelligent collaboration to every investigation

    Ready to learn more? Take a look at the menu and more, in this article by Seth Goldhammer.

    graylog.org/post/gobbling-up-i #CyberSecurity #SIEM #APISecurity #TDIR

  31. #HappyHalloween, Everyone! Sticking with the theme of the day — let's talk about how SCARY 👻 it is when cyber attackers target the riskiest users in your environment, like:

    📃 A marketing manager approving third-party contracts
    💲 An HR admin with access to payroll systems
    📛 A facilities lead managing badge entry systems

    These users hold credentials and access that attackers want. 👀 We call them VAPs - or Very Attacked People. Are you protecting them? #Security teams are buried in alerts. If you prioritize alerts based on technical severity alone it leads to noise, burnout, and missed threats. TBH it's more effective when it accounts for who is being attacked, not just how. 💡

    Learn more: graylog.org/post/are-you-prote #CyberAttack #CyberSecurity #SIEM #TDIR

  32. #HappyHalloween, Everyone! Sticking with the theme of the day — let's talk about how SCARY 👻 it is when cyber attackers target the riskiest users in your environment, like:

    📃 A marketing manager approving third-party contracts
    💲 An HR admin with access to payroll systems
    📛 A facilities lead managing badge entry systems

    These users hold credentials and access that attackers want. 👀 We call them VAPs - or Very Attacked People. Are you protecting them? #Security teams are buried in alerts. If you prioritize alerts based on technical severity alone it leads to noise, burnout, and missed threats. TBH it's more effective when it accounts for who is being attacked, not just how. 💡

    Learn more: graylog.org/post/are-you-prote #CyberAttack #CyberSecurity #SIEM #TDIR

  33. #HappyHalloween, Everyone! Sticking with the theme of the day — let's talk about how SCARY 👻 it is when cyber attackers target the riskiest users in your environment, like:

    📃 A marketing manager approving third-party contracts
    💲 An HR admin with access to payroll systems
    📛 A facilities lead managing badge entry systems

    These users hold credentials and access that attackers want. 👀 We call them VAPs - or Very Attacked People. Are you protecting them? #Security teams are buried in alerts. If you prioritize alerts based on technical severity alone it leads to noise, burnout, and missed threats. TBH it's more effective when it accounts for who is being attacked, not just how. 💡

    Learn more: graylog.org/post/are-you-prote #CyberAttack #CyberSecurity #SIEM #TDIR

  34. #HappyHalloween, Everyone! Sticking with the theme of the day — let's talk about how SCARY 👻 it is when cyber attackers target the riskiest users in your environment, like:

    📃 A marketing manager approving third-party contracts
    💲 An HR admin with access to payroll systems
    📛 A facilities lead managing badge entry systems

    These users hold credentials and access that attackers want. 👀 We call them VAPs - or Very Attacked People. Are you protecting them? #Security teams are buried in alerts. If you prioritize alerts based on technical severity alone it leads to noise, burnout, and missed threats. TBH it's more effective when it accounts for who is being attacked, not just how. 💡

    Learn more: graylog.org/post/are-you-prote #CyberAttack #CyberSecurity #SIEM #TDIR

  35. #HappyHalloween, Everyone! Sticking with the theme of the day — let's talk about how SCARY 👻 it is when cyber attackers target the riskiest users in your environment, like:

    📃 A marketing manager approving third-party contracts
    💲 An HR admin with access to payroll systems
    📛 A facilities lead managing badge entry systems

    These users hold credentials and access that attackers want. 👀 We call them VAPs - or Very Attacked People. Are you protecting them? #Security teams are buried in alerts. If you prioritize alerts based on technical severity alone it leads to noise, burnout, and missed threats. TBH it's more effective when it accounts for who is being attacked, not just how. 💡

    Learn more: graylog.org/post/are-you-prote #CyberAttack #CyberSecurity #SIEM #TDIR

  36. With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffs—like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. 💸

    But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. 😱 Seriously... when you drop data, you drop context! 👎 And, missing context can turn a minor oversight into a major blind spot. 🙈

    Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. 💡

    youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  37. With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffs—like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. 💸

    But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. 😱 Seriously... when you drop data, you drop context! 👎 And, missing context can turn a minor oversight into a major blind spot. 🙈

    Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. 💡

    youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  38. With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffs—like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. 💸

    But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. 😱 Seriously... when you drop data, you drop context! 👎 And, missing context can turn a minor oversight into a major blind spot. 🙈

    Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. 💡

    youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  39. With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffs—like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. 💸

    But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. 😱 Seriously... when you drop data, you drop context! 👎 And, missing context can turn a minor oversight into a major blind spot. 🙈

    Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. 💡

    youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  40. With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffs—like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. 💸

    But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. 😱 Seriously... when you drop data, you drop context! 👎 And, missing context can turn a minor oversight into a major blind spot. 🙈

    Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. 💡

    youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  41. Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! 🪵 ☕ This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action — and get smarter security ops that reduce risk. ⬇️ ⚠️

    From alert fatigue to risk-first response, let's unpack practical ways you can:
    ✔️ Prioritize real threats
    ✔️ Automate with context
    ✔️ Make incident response faster & more effective
    ✔️ Make SOAR useful for lean teams

    In this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.

    📺 👉 youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  42. Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! 🪵 ☕ This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action — and get smarter security ops that reduce risk. ⬇️ ⚠️

    From alert fatigue to risk-first response, let's unpack practical ways you can:
    ✔️ Prioritize real threats
    ✔️ Automate with context
    ✔️ Make incident response faster & more effective
    ✔️ Make SOAR useful for lean teams

    In this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.

    📺 👉 youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  43. Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! 🪵 ☕ This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action — and get smarter security ops that reduce risk. ⬇️ ⚠️

    From alert fatigue to risk-first response, let's unpack practical ways you can:
    ✔️ Prioritize real threats
    ✔️ Automate with context
    ✔️ Make incident response faster & more effective
    ✔️ Make SOAR useful for lean teams

    In this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.

    📺 👉 youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  44. Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! 🪵 ☕ This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action — and get smarter security ops that reduce risk. ⬇️ ⚠️

    From alert fatigue to risk-first response, let's unpack practical ways you can:
    ✔️ Prioritize real threats
    ✔️ Automate with context
    ✔️ Make incident response faster & more effective
    ✔️ Make SOAR useful for lean teams

    In this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.

    📺 👉 youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  45. Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! 🪵 ☕ This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action — and get smarter security ops that reduce risk. ⬇️ ⚠️

    From alert fatigue to risk-first response, let's unpack practical ways you can:
    ✔️ Prioritize real threats
    ✔️ Automate with context
    ✔️ Make incident response faster & more effective
    ✔️ Make SOAR useful for lean teams

    In this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.

    📺 👉 youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes

  46. Инновации в кибербезопасности: обзор Carmina AI от Innostage

    Инновации в кибербезопасности: обзор Carmina AI от Innostage Автор: Олейникова Анна, директор по продуктовому развитию Innostage Innostage Carmina AI – это виртуальный помощник, объединяющий передовые технологии искусственного интеллекта, большие языковые модели (LLM) и машинное обучение (ML), предназначенный для специалистов центров мониторинга безопасности. Его главная цель – разгрузить специалистов от типовых операций, ускорить выявление угроз и обеспечить оперативное реагирование на киберинциденты.

    habr.com/ru/companies/innostag

    #Carmina_AI #Innostage #ИИассисент #SOC #SOAR #SIEM #Threat_Intelligence #LLM #ML #TDIR

  47. Инновации в кибербезопасности: обзор Carmina AI от Innostage

    Инновации в кибербезопасности: обзор Carmina AI от Innostage Автор: Олейникова Анна, директор по продуктовому развитию Innostage Innostage Carmina AI – это виртуальный помощник, объединяющий передовые технологии искусственного интеллекта, большие языковые модели (LLM) и машинное обучение (ML), предназначенный для специалистов центров мониторинга безопасности. Его главная цель – разгрузить специалистов от типовых операций, ускорить выявление угроз и обеспечить оперативное реагирование на киберинциденты.

    habr.com/ru/companies/innostag

    #Carmina_AI #Innostage #ИИассисент #SOC #SOAR #SIEM #Threat_Intelligence #LLM #ML #TDIR

  48. Инновации в кибербезопасности: обзор Carmina AI от Innostage

    Инновации в кибербезопасности: обзор Carmina AI от Innostage Автор: Олейникова Анна, директор по продуктовому развитию Innostage Innostage Carmina AI – это виртуальный помощник, объединяющий передовые технологии искусственного интеллекта, большие языковые модели (LLM) и машинное обучение (ML), предназначенный для специалистов центров мониторинга безопасности. Его главная цель – разгрузить специалистов от типовых операций, ускорить выявление угроз и обеспечить оперативное реагирование на киберинциденты.

    habr.com/ru/companies/innostag

    #Carmina_AI #Innostage #ИИассисент #SOC #SOAR #SIEM #Threat_Intelligence #LLM #ML #TDIR

  49. Инновации в кибербезопасности: обзор Carmina AI от Innostage

    Инновации в кибербезопасности: обзор Carmina AI от Innostage Автор: Олейникова Анна, директор по продуктовому развитию Innostage Innostage Carmina AI – это виртуальный помощник, объединяющий передовые технологии искусственного интеллекта, большие языковые модели (LLM) и машинное обучение (ML), предназначенный для специалистов центров мониторинга безопасности. Его главная цель – разгрузить специалистов от типовых операций, ускорить выявление угроз и обеспечить оперативное реагирование на киберинциденты.

    habr.com/ru/companies/innostag

    #Carmina_AI #Innostage #ИИассисент #SOC #SOAR #SIEM #Threat_Intelligence #LLM #ML #TDIR

  50. Drum roll please! 🥁🥁🥁 Today we are excited to introduce the new Logs & Lattes podcast. 💥🎙️ In this inaugural episode, Seth Goldhammer joins host Palmer Wallace to talk about the hidden cost of traditional #SIEM pricing. ⛔ 💵 🤔

    How much value are we really getting from our logs, and what are we giving up to stay on budget? Let's talk about how ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffs—like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. 😓

    But, there’s a smarter way forward. 😍 Learn how to escape this tradeoff trap and get the most out of your security data. Watch now! 📺 👇

    youtu.be/c7he-teNdO8 #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes