The Graylog

BLOG

What's new in
Graylog 5.2?

Read the release notes on Graylog v5.2

GL_Backgrounds_033

WHAT YOU NEED TO KNOW ABOUT ITIL FOR SERVICE MANAGEMENT

As the person on the front lines, you know that providing the best service possible can be what makes your ITSM organization succeed.

SECURITY AWARENESS AND LOG MANAGEMENT FOR SECURITY ANALYSTS

For today’s remote workforce, security professionals need technical security awareness education distinct from the rest of the company’s “don’t click a phishing link” training.

GL_Backgrounds_034

Ultimate Guide to Sigma Rules

Leverage sigma rules capabilities to optimize your centralized log management solution for security detection and response.

How To Guide: Security Graylog with TLS

Get ready to secure your Graylog Server with TLS for enhanced data protection!

Online Security Check and Privacy Concept. Fingerprint and Computer Police Database Scan. Person Screening.

DIGITAL OPERATIONAL RESILIENCE ACT

The financial services industry has been a threat actor target since before digital ...

Latest

Graylog V5.2 is here! The brand new version of Graylog, v5.2, is here and ready to provide the most up-to-date log management and SIEM experience yet. Get ready for fantastic

Organizations collect technologies like kids collecting baseball cards. As a company’s IT strategy matures, it adds new technologies to supplement previously existing ones, just like kids add new rookie cards

Whether you’re a developer or a security analyst, you probably already know the name Docker. Developers use Docker’s open-source platform to build, package, and distribute their applications. Since the application

Using Virustotal to Detect Malware

As one of the oldest attack methods, malware is both well-known to security professionals and well-loved by malicious actors. According to the Independent IT-Security Institute, the total amount of malware

Sending Windows Logs to CLM

Looking at your IT environment, you probably have various machines and applications connected to your networks. From network devices to servers to laptops, you need to know what’s happening at