Graylog Blog

Introducing Graylog 6.2: A SIEM Without Compromise

Read about Graylog v6.2

GL_Backgrounds_033

What You Need to Know About ITIL

As the person on the front lines, you know that providing the best service possible can be what makes your ITSM organization succeed.

Security Awareness and Log Management for Security Analysts

For today’s remote workforce, security professionals need technical security awareness education distinct from the rest of the company’s “don’t click a phishing link” training.

GL_Backgrounds_034

Ultimate Guide to Sigma Rules

Leverage sigma rules capabilities to optimize your centralized log management solution for security detection and response.

How To Guide: Secure Graylog with TLS

Get ready to secure your Graylog Server with TLS for enhanced data protection!

Online Security Check and Privacy Concept. Fingerprint and Computer Police Database Scan. Person Screening.

Digital Operational Resilience Act

The financial services industry has been a threat actor target since before digital ...

Introducing Graylog 6.2: A SIEM Without Compromise

Read what's new in Graylog v6.2

GL_Backgrounds_033

WHAT YOU NEED TO KNOW ABOUT ITIL FOR SERVICE MANAGEMENT

As the person on the front lines, you know that providing the best service possible can be what makes your ITSM organization succeed.

SECURITY AWARENESS AND LOG MANAGEMENT FOR SECURITY ANALYSTS

For today’s remote workforce, security professionals need technical security awareness education distinct from the rest of the company’s “don’t click a phishing link” training.

GL_Backgrounds_034

Ultimate Guide to Sigma Rules

Leverage sigma rules capabilities to optimize your centralized log management solution for security detection and response.

How To Guide: Secure Graylog with TLS

Get ready to secure your Graylog Server with TLS for enhanced data protection!

Online Security Check and Privacy Concept. Fingerprint and Computer Police Database Scan. Person Screening.

Digital Operational Resilience Act

The financial services industry has been a threat actor target since before digital ...

Latest

Special Notice

Graylog Security Notice – Escalated Privilege Vulnerability Date: 24 June 2025 Severity: High CVE ID: submitted, publication pending Product/Component Affected: All Graylog Editions – Open, Enterprise and Security   Summary

OpenTelemetry Data into Graylog

OpenTelemetry is emerging as the common framework for collecting observability data, and for good reason. It’s vendor-neutral, open source, and designed to collect traces, metrics, and logs in a consistent

Topic Ideas We welcome proposals from Graylog Security and Enterprise customers and Graylog open source users. You don’t need to be a professional speaker—just someone with a story worth telling.

Graylog Release Updates

Get the Monthly Tech Blog Roundup

Subscribe to the latest in log management, security, and all things Graylog blog delivered to your inbox once a month.