#tdir — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #tdir, aggregated by home.social.
-
Are you using your #SIEM to detect #security threats in the most efficient and effective ways possible❓🤔 When you implement and fine-tune SIEM detections, you strengthen your security posture and become better able to strategically aligning with your business objectives.
Fine-tuning your SIEM detections specifically allows you to:
💡 Improve threat detection with smarter correlation
⬆️ Accelerate incident response
👀 Gain comprehensive visibility into your environment
☑️ Enable compliance and audit readiness
😌 Reduce alert fatigueRead on, to learn about 6 specific steps you can take that will help you build fine-tuned detections and high-fidelity alerts.👇
https://graylog.org/post/6-steps-for-using-a-siem-to-detect-threats/ #ThreatDetection #IncidentResponse #TDIR #CyberSecurity
-
Are you using your #SIEM to detect #security threats in the most efficient and effective ways possible❓🤔 When you implement and fine-tune SIEM detections, you strengthen your security posture and become better able to strategically aligning with your business objectives.
Fine-tuning your SIEM detections specifically allows you to:
💡 Improve threat detection with smarter correlation
⬆️ Accelerate incident response
👀 Gain comprehensive visibility into your environment
☑️ Enable compliance and audit readiness
😌 Reduce alert fatigueRead on, to learn about 6 specific steps you can take that will help you build fine-tuned detections and high-fidelity alerts.👇
https://graylog.org/post/6-steps-for-using-a-siem-to-detect-threats/ #ThreatDetection #IncidentResponse #TDIR #CyberSecurity
-
Are you using your #SIEM to detect #security threats in the most efficient and effective ways possible❓🤔 When you implement and fine-tune SIEM detections, you strengthen your security posture and become better able to strategically aligning with your business objectives.
Fine-tuning your SIEM detections specifically allows you to:
💡 Improve threat detection with smarter correlation
⬆️ Accelerate incident response
👀 Gain comprehensive visibility into your environment
☑️ Enable compliance and audit readiness
😌 Reduce alert fatigueRead on, to learn about 6 specific steps you can take that will help you build fine-tuned detections and high-fidelity alerts.👇
https://graylog.org/post/6-steps-for-using-a-siem-to-detect-threats/ #ThreatDetection #IncidentResponse #TDIR #CyberSecurity
-
Are you using your #SIEM to detect #security threats in the most efficient and effective ways possible❓🤔 When you implement and fine-tune SIEM detections, you strengthen your security posture and become better able to strategically aligning with your business objectives.
Fine-tuning your SIEM detections specifically allows you to:
💡 Improve threat detection with smarter correlation
⬆️ Accelerate incident response
👀 Gain comprehensive visibility into your environment
☑️ Enable compliance and audit readiness
😌 Reduce alert fatigueRead on, to learn about 6 specific steps you can take that will help you build fine-tuned detections and high-fidelity alerts.👇
https://graylog.org/post/6-steps-for-using-a-siem-to-detect-threats/ #ThreatDetection #IncidentResponse #TDIR #CyberSecurity
-
Are you using your #SIEM to detect #security threats in the most efficient and effective ways possible❓🤔 When you implement and fine-tune SIEM detections, you strengthen your security posture and become better able to strategically aligning with your business objectives.
Fine-tuning your SIEM detections specifically allows you to:
💡 Improve threat detection with smarter correlation
⬆️ Accelerate incident response
👀 Gain comprehensive visibility into your environment
☑️ Enable compliance and audit readiness
😌 Reduce alert fatigueRead on, to learn about 6 specific steps you can take that will help you build fine-tuned detections and high-fidelity alerts.👇
https://graylog.org/post/6-steps-for-using-a-siem-to-detect-threats/ #ThreatDetection #IncidentResponse #TDIR #CyberSecurity
-
Is your financial institution as safe as it could be from #ransomware and other cyber threats? 🤔 Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. 🏦 💰
But have no fear, Graylog + Model Context Protocol (MCP) are here to help! 🦸💪 Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources — to enable threat detection content in their current #Graylog deployment.
See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.👇
https://graylog.org/post/how-to-use-mcp-to-optimize-your-graylog-security-detections/
-
Is your financial institution as safe as it could be from #ransomware and other cyber threats? 🤔 Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. 🏦 💰
But have no fear, Graylog + Model Context Protocol (MCP) are here to help! 🦸💪 Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources — to enable threat detection content in their current #Graylog deployment.
See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.👇
https://graylog.org/post/how-to-use-mcp-to-optimize-your-graylog-security-detections/
-
Is your financial institution as safe as it could be from #ransomware and other cyber threats? 🤔 Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. 🏦 💰
But have no fear, Graylog + Model Context Protocol (MCP) are here to help! 🦸💪 Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources — to enable threat detection content in their current #Graylog deployment.
See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.👇
https://graylog.org/post/how-to-use-mcp-to-optimize-your-graylog-security-detections/
-
Is your financial institution as safe as it could be from #ransomware and other cyber threats? 🤔 Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. 🏦 💰
But have no fear, Graylog + Model Context Protocol (MCP) are here to help! 🦸💪 Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources — to enable threat detection content in their current #Graylog deployment.
See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.👇
https://graylog.org/post/how-to-use-mcp-to-optimize-your-graylog-security-detections/
-
Is your financial institution as safe as it could be from #ransomware and other cyber threats? 🤔 Groups like FIN7, Lazarus Group, and Carbanak often specifically target banks with sophisticated attacks, like SWIFT compromises and more. 🏦 💰
But have no fear, Graylog + Model Context Protocol (MCP) are here to help! 🦸💪 Today, Seth Goldhammer is walking you through a real world example where a bank in the north east, with a simple #Anthropic prompt, learned that it needed to understand the threat landscape and map it to their current log sources — to enable threat detection content in their current #Graylog deployment.
See how they mastered the challenge and enabled real-time, context-aware recommendations based on their actual environment, in our latest Graylog Labs article.👇
https://graylog.org/post/how-to-use-mcp-to-optimize-your-graylog-security-detections/
-
Data lakes are typically thought of as simple warehouses. But they don't have to be! 👀 In Graylog 7.0 data lakes function as pressure release valves for #security teams overwhelmed by storage costs, investigation delays, and cloud data sprawl — where analysts can get direct access to long term data, and more.
Our data lake provides inexpensive storage where logs stay searchable, preview-able, and recoverable. Learn more about getting cloud scale without cloud surprises, and why this is a truly practical stance on managing data volume.
https://graylog.org/post/how-to-use-data-lakes-to-reduce-siem-costs-and-strengthen-investigations/ #CyberSecurity #SEIM #DataLake #TDIR
-
Data lakes are typically thought of as simple warehouses. But they don't have to be! 👀 In Graylog 7.0 data lakes function as pressure release valves for #security teams overwhelmed by storage costs, investigation delays, and cloud data sprawl — where analysts can get direct access to long term data, and more.
Our data lake provides inexpensive storage where logs stay searchable, preview-able, and recoverable. Learn more about getting cloud scale without cloud surprises, and why this is a truly practical stance on managing data volume.
https://graylog.org/post/how-to-use-data-lakes-to-reduce-siem-costs-and-strengthen-investigations/ #CyberSecurity #SEIM #DataLake #TDIR
-
Data lakes are typically thought of as simple warehouses. But they don't have to be! 👀 In Graylog 7.0 data lakes function as pressure release valves for #security teams overwhelmed by storage costs, investigation delays, and cloud data sprawl — where analysts can get direct access to long term data, and more.
Our data lake provides inexpensive storage where logs stay searchable, preview-able, and recoverable. Learn more about getting cloud scale without cloud surprises, and why this is a truly practical stance on managing data volume.
https://graylog.org/post/how-to-use-data-lakes-to-reduce-siem-costs-and-strengthen-investigations/ #CyberSecurity #SEIM #DataLake #TDIR
-
Data lakes are typically thought of as simple warehouses. But they don't have to be! 👀 In Graylog 7.0 data lakes function as pressure release valves for #security teams overwhelmed by storage costs, investigation delays, and cloud data sprawl — where analysts can get direct access to long term data, and more.
Our data lake provides inexpensive storage where logs stay searchable, preview-able, and recoverable. Learn more about getting cloud scale without cloud surprises, and why this is a truly practical stance on managing data volume.
https://graylog.org/post/how-to-use-data-lakes-to-reduce-siem-costs-and-strengthen-investigations/ #CyberSecurity #SEIM #DataLake #TDIR
-
Data lakes are typically thought of as simple warehouses. But they don't have to be! 👀 In Graylog 7.0 data lakes function as pressure release valves for #security teams overwhelmed by storage costs, investigation delays, and cloud data sprawl — where analysts can get direct access to long term data, and more.
Our data lake provides inexpensive storage where logs stay searchable, preview-able, and recoverable. Learn more about getting cloud scale without cloud surprises, and why this is a truly practical stance on managing data volume.
https://graylog.org/post/how-to-use-data-lakes-to-reduce-siem-costs-and-strengthen-investigations/ #CyberSecurity #SEIM #DataLake #TDIR
-
#Graylog 7.0 is out, and Ethan C. Keaton's avatar is here to show you how to upgrade! 💥 Whether you're running a small log server or managing an enterprise cluster, keeping Graylog up to date means better performance, stronger #security, and access to the latest features. 👍
Watch now and get help with preparing your system, upgrading MongoDB and Data Node safely, and more. Ready to get it done without breaking your setup? 👀 Let's go! 👇
📺 https://www.youtube.com/watch?v=uWZlC5DY9WA #CyberSecurity #LogManagement #SIEM #TDIR
-
#Graylog 7.0 is out, and Ethan C. Keaton's avatar is here to show you how to upgrade! 💥 Whether you're running a small log server or managing an enterprise cluster, keeping Graylog up to date means better performance, stronger #security, and access to the latest features. 👍
Watch now and get help with preparing your system, upgrading MongoDB and Data Node safely, and more. Ready to get it done without breaking your setup? 👀 Let's go! 👇
📺 https://www.youtube.com/watch?v=uWZlC5DY9WA #CyberSecurity #LogManagement #SIEM #TDIR
-
#Graylog 7.0 is out, and Ethan C. Keaton's avatar is here to show you how to upgrade! 💥 Whether you're running a small log server or managing an enterprise cluster, keeping Graylog up to date means better performance, stronger #security, and access to the latest features. 👍
Watch now and get help with preparing your system, upgrading MongoDB and Data Node safely, and more. Ready to get it done without breaking your setup? 👀 Let's go! 👇
📺 https://www.youtube.com/watch?v=uWZlC5DY9WA #CyberSecurity #LogManagement #SIEM #TDIR
-
#Graylog 7.0 is out, and Ethan C. Keaton's avatar is here to show you how to upgrade! 💥 Whether you're running a small log server or managing an enterprise cluster, keeping Graylog up to date means better performance, stronger #security, and access to the latest features. 👍
Watch now and get help with preparing your system, upgrading MongoDB and Data Node safely, and more. Ready to get it done without breaking your setup? 👀 Let's go! 👇
📺 https://www.youtube.com/watch?v=uWZlC5DY9WA #CyberSecurity #LogManagement #SIEM #TDIR
-
#Graylog 7.0 is out, and Ethan C. Keaton's avatar is here to show you how to upgrade! 💥 Whether you're running a small log server or managing an enterprise cluster, keeping Graylog up to date means better performance, stronger #security, and access to the latest features. 👍
Watch now and get help with preparing your system, upgrading MongoDB and Data Node safely, and more. Ready to get it done without breaking your setup? 👀 Let's go! 👇
📺 https://www.youtube.com/watch?v=uWZlC5DY9WA #CyberSecurity #LogManagement #SIEM #TDIR
-
Are you working on building an efficient SOC? We can help! 🙌 It's important to start by developing a strategy—as your #security goals must align with business objectives. 💡 In our latest blog, we outline and detail 7 key steps to follow for SOC success. ⭐ They include:
1️⃣ Developing the strategy
2️⃣ Designing the solution
3️⃣ Developing processes, procedures, & training
4️⃣ Investing in tools & services to fill gaps
5️⃣ Preparing your environment
6️⃣ Implementing the solution
7️⃣ Deploying end-to-end use casesRead on to learn more about these 7 key steps along with roles and responsibilities of SOC team members, and more.
https://graylog.org/post/7-steps-to-an-efficient-security-operations-center-design/ #CyberSecurity #SIEM #TDIR #APISecurity #SecurityOperations
-
Are you working on building an efficient SOC? We can help! 🙌 It's important to start by developing a strategy—as your #security goals must align with business objectives. 💡 In our latest blog, we outline and detail 7 key steps to follow for SOC success. ⭐ They include:
1️⃣ Developing the strategy
2️⃣ Designing the solution
3️⃣ Developing processes, procedures, & training
4️⃣ Investing in tools & services to fill gaps
5️⃣ Preparing your environment
6️⃣ Implementing the solution
7️⃣ Deploying end-to-end use casesRead on to learn more about these 7 key steps along with roles and responsibilities of SOC team members, and more.
https://graylog.org/post/7-steps-to-an-efficient-security-operations-center-design/ #CyberSecurity #SIEM #TDIR #APISecurity #SecurityOperations
-
Are you working on building an efficient SOC? We can help! 🙌 It's important to start by developing a strategy—as your #security goals must align with business objectives. 💡 In our latest blog, we outline and detail 7 key steps to follow for SOC success. ⭐ They include:
1️⃣ Developing the strategy
2️⃣ Designing the solution
3️⃣ Developing processes, procedures, & training
4️⃣ Investing in tools & services to fill gaps
5️⃣ Preparing your environment
6️⃣ Implementing the solution
7️⃣ Deploying end-to-end use casesRead on to learn more about these 7 key steps along with roles and responsibilities of SOC team members, and more.
https://graylog.org/post/7-steps-to-an-efficient-security-operations-center-design/ #CyberSecurity #SIEM #TDIR #APISecurity #SecurityOperations
-
Are you working on building an efficient SOC? We can help! 🙌 It's important to start by developing a strategy—as your #security goals must align with business objectives. 💡 In our latest blog, we outline and detail 7 key steps to follow for SOC success. ⭐ They include:
1️⃣ Developing the strategy
2️⃣ Designing the solution
3️⃣ Developing processes, procedures, & training
4️⃣ Investing in tools & services to fill gaps
5️⃣ Preparing your environment
6️⃣ Implementing the solution
7️⃣ Deploying end-to-end use casesRead on to learn more about these 7 key steps along with roles and responsibilities of SOC team members, and more.
https://graylog.org/post/7-steps-to-an-efficient-security-operations-center-design/ #CyberSecurity #SIEM #TDIR #APISecurity #SecurityOperations
-
Are you working on building an efficient SOC? We can help! 🙌 It's important to start by developing a strategy—as your #security goals must align with business objectives. 💡 In our latest blog, we outline and detail 7 key steps to follow for SOC success. ⭐ They include:
1️⃣ Developing the strategy
2️⃣ Designing the solution
3️⃣ Developing processes, procedures, & training
4️⃣ Investing in tools & services to fill gaps
5️⃣ Preparing your environment
6️⃣ Implementing the solution
7️⃣ Deploying end-to-end use casesRead on to learn more about these 7 key steps along with roles and responsibilities of SOC team members, and more.
https://graylog.org/post/7-steps-to-an-efficient-security-operations-center-design/ #CyberSecurity #SIEM #TDIR #APISecurity #SecurityOperations
-
Welcome to November, the end of daylight savings time, and everything "T-Day" for the next four weeks! In the spirit of this month we've got a feast of new features, a cornucopia of new capabilities and a banquet of breakthroughs to share with you. 🦃 🫵 Introducing #Graylog 7.0! 🎊
Let's take a look at the new improvements across dashboards, automation, and #AI support. There are four key ingredients in this 7.0 #Thanksgiving feast:
💡 Smarter Dashboards that deliver faster, more meaningful insights
🛠️ Guided Remediation that ensures consistent, reliable action
💲 Cost-efficient Data Lake Integration that simplifies cloud management
🤝 Native MCP Support that brings intelligent collaboration to every investigationReady to learn more? Take a look at the menu and more, in this article by Seth Goldhammer.
https://graylog.org/post/gobbling-up-insights-graylog-7-0-serves-up-a-feast/ #CyberSecurity #SIEM #APISecurity #TDIR
-
Welcome to November, the end of daylight savings time, and everything "T-Day" for the next four weeks! In the spirit of this month we've got a feast of new features, a cornucopia of new capabilities and a banquet of breakthroughs to share with you. 🦃 🫵 Introducing #Graylog 7.0! 🎊
Let's take a look at the new improvements across dashboards, automation, and #AI support. There are four key ingredients in this 7.0 #Thanksgiving feast:
💡 Smarter Dashboards that deliver faster, more meaningful insights
🛠️ Guided Remediation that ensures consistent, reliable action
💲 Cost-efficient Data Lake Integration that simplifies cloud management
🤝 Native MCP Support that brings intelligent collaboration to every investigationReady to learn more? Take a look at the menu and more, in this article by Seth Goldhammer.
https://graylog.org/post/gobbling-up-insights-graylog-7-0-serves-up-a-feast/ #CyberSecurity #SIEM #APISecurity #TDIR
-
Welcome to November, the end of daylight savings time, and everything "T-Day" for the next four weeks! In the spirit of this month we've got a feast of new features, a cornucopia of new capabilities and a banquet of breakthroughs to share with you. 🦃 🫵 Introducing #Graylog 7.0! 🎊
Let's take a look at the new improvements across dashboards, automation, and #AI support. There are four key ingredients in this 7.0 #Thanksgiving feast:
💡 Smarter Dashboards that deliver faster, more meaningful insights
🛠️ Guided Remediation that ensures consistent, reliable action
💲 Cost-efficient Data Lake Integration that simplifies cloud management
🤝 Native MCP Support that brings intelligent collaboration to every investigationReady to learn more? Take a look at the menu and more, in this article by Seth Goldhammer.
https://graylog.org/post/gobbling-up-insights-graylog-7-0-serves-up-a-feast/ #CyberSecurity #SIEM #APISecurity #TDIR
-
Welcome to November, the end of daylight savings time, and everything "T-Day" for the next four weeks! In the spirit of this month we've got a feast of new features, a cornucopia of new capabilities and a banquet of breakthroughs to share with you. 🦃 🫵 Introducing #Graylog 7.0! 🎊
Let's take a look at the new improvements across dashboards, automation, and #AI support. There are four key ingredients in this 7.0 #Thanksgiving feast:
💡 Smarter Dashboards that deliver faster, more meaningful insights
🛠️ Guided Remediation that ensures consistent, reliable action
💲 Cost-efficient Data Lake Integration that simplifies cloud management
🤝 Native MCP Support that brings intelligent collaboration to every investigationReady to learn more? Take a look at the menu and more, in this article by Seth Goldhammer.
https://graylog.org/post/gobbling-up-insights-graylog-7-0-serves-up-a-feast/ #CyberSecurity #SIEM #APISecurity #TDIR
-
Welcome to November, the end of daylight savings time, and everything "T-Day" for the next four weeks! In the spirit of this month we've got a feast of new features, a cornucopia of new capabilities and a banquet of breakthroughs to share with you. 🦃 🫵 Introducing #Graylog 7.0! 🎊
Let's take a look at the new improvements across dashboards, automation, and #AI support. There are four key ingredients in this 7.0 #Thanksgiving feast:
💡 Smarter Dashboards that deliver faster, more meaningful insights
🛠️ Guided Remediation that ensures consistent, reliable action
💲 Cost-efficient Data Lake Integration that simplifies cloud management
🤝 Native MCP Support that brings intelligent collaboration to every investigationReady to learn more? Take a look at the menu and more, in this article by Seth Goldhammer.
https://graylog.org/post/gobbling-up-insights-graylog-7-0-serves-up-a-feast/ #CyberSecurity #SIEM #APISecurity #TDIR
-
#HappyHalloween, Everyone! Sticking with the theme of the day — let's talk about how SCARY 👻 it is when cyber attackers target the riskiest users in your environment, like:
📃 A marketing manager approving third-party contracts
💲 An HR admin with access to payroll systems
📛 A facilities lead managing badge entry systemsThese users hold credentials and access that attackers want. 👀 We call them VAPs - or Very Attacked People. Are you protecting them? #Security teams are buried in alerts. If you prioritize alerts based on technical severity alone it leads to noise, burnout, and missed threats. TBH it's more effective when it accounts for who is being attacked, not just how. 💡
Learn more: https://graylog.org/post/are-you-protecting-the-right-people-in-your-organization/ #CyberAttack #CyberSecurity #SIEM #TDIR
-
#HappyHalloween, Everyone! Sticking with the theme of the day — let's talk about how SCARY 👻 it is when cyber attackers target the riskiest users in your environment, like:
📃 A marketing manager approving third-party contracts
💲 An HR admin with access to payroll systems
📛 A facilities lead managing badge entry systemsThese users hold credentials and access that attackers want. 👀 We call them VAPs - or Very Attacked People. Are you protecting them? #Security teams are buried in alerts. If you prioritize alerts based on technical severity alone it leads to noise, burnout, and missed threats. TBH it's more effective when it accounts for who is being attacked, not just how. 💡
Learn more: https://graylog.org/post/are-you-protecting-the-right-people-in-your-organization/ #CyberAttack #CyberSecurity #SIEM #TDIR
-
#HappyHalloween, Everyone! Sticking with the theme of the day — let's talk about how SCARY 👻 it is when cyber attackers target the riskiest users in your environment, like:
📃 A marketing manager approving third-party contracts
💲 An HR admin with access to payroll systems
📛 A facilities lead managing badge entry systemsThese users hold credentials and access that attackers want. 👀 We call them VAPs - or Very Attacked People. Are you protecting them? #Security teams are buried in alerts. If you prioritize alerts based on technical severity alone it leads to noise, burnout, and missed threats. TBH it's more effective when it accounts for who is being attacked, not just how. 💡
Learn more: https://graylog.org/post/are-you-protecting-the-right-people-in-your-organization/ #CyberAttack #CyberSecurity #SIEM #TDIR
-
#HappyHalloween, Everyone! Sticking with the theme of the day — let's talk about how SCARY 👻 it is when cyber attackers target the riskiest users in your environment, like:
📃 A marketing manager approving third-party contracts
💲 An HR admin with access to payroll systems
📛 A facilities lead managing badge entry systemsThese users hold credentials and access that attackers want. 👀 We call them VAPs - or Very Attacked People. Are you protecting them? #Security teams are buried in alerts. If you prioritize alerts based on technical severity alone it leads to noise, burnout, and missed threats. TBH it's more effective when it accounts for who is being attacked, not just how. 💡
Learn more: https://graylog.org/post/are-you-protecting-the-right-people-in-your-organization/ #CyberAttack #CyberSecurity #SIEM #TDIR
-
#HappyHalloween, Everyone! Sticking with the theme of the day — let's talk about how SCARY 👻 it is when cyber attackers target the riskiest users in your environment, like:
📃 A marketing manager approving third-party contracts
💲 An HR admin with access to payroll systems
📛 A facilities lead managing badge entry systemsThese users hold credentials and access that attackers want. 👀 We call them VAPs - or Very Attacked People. Are you protecting them? #Security teams are buried in alerts. If you prioritize alerts based on technical severity alone it leads to noise, burnout, and missed threats. TBH it's more effective when it accounts for who is being attacked, not just how. 💡
Learn more: https://graylog.org/post/are-you-protecting-the-right-people-in-your-organization/ #CyberAttack #CyberSecurity #SIEM #TDIR
-
With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffs—like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. 💸
But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. 😱 Seriously... when you drop data, you drop context! 👎 And, missing context can turn a minor oversight into a major blind spot. 🙈
Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. 💡
https://www.youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffs—like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. 💸
But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. 😱 Seriously... when you drop data, you drop context! 👎 And, missing context can turn a minor oversight into a major blind spot. 🙈
Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. 💡
https://www.youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffs—like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. 💸
But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. 😱 Seriously... when you drop data, you drop context! 👎 And, missing context can turn a minor oversight into a major blind spot. 🙈
Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. 💡
https://www.youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffs—like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. 💸
But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. 😱 Seriously... when you drop data, you drop context! 👎 And, missing context can turn a minor oversight into a major blind spot. 🙈
Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. 💡
https://www.youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
With SIEMs, ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffs—like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. 💸
But, tradeoffs like these affect compliance, visibility, detection capabilities, and response time. 😱 Seriously... when you drop data, you drop context! 👎 And, missing context can turn a minor oversight into a major blind spot. 🙈
Watch this enlightening discussion and learn how flexible data routing can allow your team to prioritize the data that powers threat detection, while retaining the rest cost-effectively in a standby data lake. 💡
https://www.youtube.com/watch?v=c7he-teNdO8 #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! 🪵 ☕ This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action — and get smarter security ops that reduce risk. ⬇️ ⚠️
From alert fatigue to risk-first response, let's unpack practical ways you can:
✔️ Prioritize real threats
✔️ Automate with context
✔️ Make incident response faster & more effective
✔️ Make SOAR useful for lean teamsIn this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.
📺 👉 https://youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! 🪵 ☕ This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action — and get smarter security ops that reduce risk. ⬇️ ⚠️
From alert fatigue to risk-first response, let's unpack practical ways you can:
✔️ Prioritize real threats
✔️ Automate with context
✔️ Make incident response faster & more effective
✔️ Make SOAR useful for lean teamsIn this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.
📺 👉 https://youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! 🪵 ☕ This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action — and get smarter security ops that reduce risk. ⬇️ ⚠️
From alert fatigue to risk-first response, let's unpack practical ways you can:
✔️ Prioritize real threats
✔️ Automate with context
✔️ Make incident response faster & more effective
✔️ Make SOAR useful for lean teamsIn this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.
📺 👉 https://youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! 🪵 ☕ This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action — and get smarter security ops that reduce risk. ⬇️ ⚠️
From alert fatigue to risk-first response, let's unpack practical ways you can:
✔️ Prioritize real threats
✔️ Automate with context
✔️ Make incident response faster & more effective
✔️ Make SOAR useful for lean teamsIn this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.
📺 👉 https://youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
Grab a cuppa joe and cozy up to your computer for Episode 2 of Logs & Lattes! 🪵 ☕ This week, host Palmer Wallace is talking with Rich Murphy about how you can go from noise to action — and get smarter security ops that reduce risk. ⬇️ ⚠️
From alert fatigue to risk-first response, let's unpack practical ways you can:
✔️ Prioritize real threats
✔️ Automate with context
✔️ Make incident response faster & more effective
✔️ Make SOAR useful for lean teamsIn this episode, we discuss how to respond to #security alerts with purpose, not just speed. Ready? Let's dive in.
📺 👉 https://youtu.be/a40J3rSs_PI #SIEM #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes
-
Инновации в кибербезопасности: обзор Carmina AI от Innostage
Инновации в кибербезопасности: обзор Carmina AI от Innostage Автор: Олейникова Анна, директор по продуктовому развитию Innostage Innostage Carmina AI – это виртуальный помощник, объединяющий передовые технологии искусственного интеллекта, большие языковые модели (LLM) и машинное обучение (ML), предназначенный для специалистов центров мониторинга безопасности. Его главная цель – разгрузить специалистов от типовых операций, ускорить выявление угроз и обеспечить оперативное реагирование на киберинциденты.
https://habr.com/ru/companies/innostage/articles/956820/
#Carmina_AI #Innostage #ИИассисент #SOC #SOAR #SIEM #Threat_Intelligence #LLM #ML #TDIR
-
Инновации в кибербезопасности: обзор Carmina AI от Innostage
Инновации в кибербезопасности: обзор Carmina AI от Innostage Автор: Олейникова Анна, директор по продуктовому развитию Innostage Innostage Carmina AI – это виртуальный помощник, объединяющий передовые технологии искусственного интеллекта, большие языковые модели (LLM) и машинное обучение (ML), предназначенный для специалистов центров мониторинга безопасности. Его главная цель – разгрузить специалистов от типовых операций, ускорить выявление угроз и обеспечить оперативное реагирование на киберинциденты.
https://habr.com/ru/companies/innostage/articles/956820/
#Carmina_AI #Innostage #ИИассисент #SOC #SOAR #SIEM #Threat_Intelligence #LLM #ML #TDIR
-
Инновации в кибербезопасности: обзор Carmina AI от Innostage
Инновации в кибербезопасности: обзор Carmina AI от Innostage Автор: Олейникова Анна, директор по продуктовому развитию Innostage Innostage Carmina AI – это виртуальный помощник, объединяющий передовые технологии искусственного интеллекта, большие языковые модели (LLM) и машинное обучение (ML), предназначенный для специалистов центров мониторинга безопасности. Его главная цель – разгрузить специалистов от типовых операций, ускорить выявление угроз и обеспечить оперативное реагирование на киберинциденты.
https://habr.com/ru/companies/innostage/articles/956820/
#Carmina_AI #Innostage #ИИассисент #SOC #SOAR #SIEM #Threat_Intelligence #LLM #ML #TDIR
-
Инновации в кибербезопасности: обзор Carmina AI от Innostage
Инновации в кибербезопасности: обзор Carmina AI от Innostage Автор: Олейникова Анна, директор по продуктовому развитию Innostage Innostage Carmina AI – это виртуальный помощник, объединяющий передовые технологии искусственного интеллекта, большие языковые модели (LLM) и машинное обучение (ML), предназначенный для специалистов центров мониторинга безопасности. Его главная цель – разгрузить специалистов от типовых операций, ускорить выявление угроз и обеспечить оперативное реагирование на киберинциденты.
https://habr.com/ru/companies/innostage/articles/956820/
#Carmina_AI #Innostage #ИИассисент #SOC #SOAR #SIEM #Threat_Intelligence #LLM #ML #TDIR
-
Drum roll please! 🥁🥁🥁 Today we are excited to introduce the new Logs & Lattes podcast. 💥🎙️ In this inaugural episode, Seth Goldhammer joins host Palmer Wallace to talk about the hidden cost of traditional #SIEM pricing. ⛔ 💵 🤔
How much value are we really getting from our logs, and what are we giving up to stay on budget? Let's talk about how ingest-based and resource-heavy licensing models pressure #security teams into tough tradeoffs—like dropping logs, tuning down detections, or limiting retention just to avoid budget overages. 😓
But, there’s a smarter way forward. 😍 Learn how to escape this tradeoff trap and get the most out of your security data. Watch now! 📺 👇
https://youtu.be/c7he-teNdO8 #SecurityOperations #LogManagement #CyberSecurity #Graylog #TDIR #LogsandLattes