Using IP Lookup for Cybersecurity Monitoring

Using IP Lookup for Cybersecurity Monitoring

Wherever you live, people can find you using either a street address or a set of latitude and longitude numbers. In the digital world, your website’s domain name or URL is the street address while the IP address is the latitude and longitude. For example, it would be cumbersome to tell people that you live […]

Announcing Graylog 6.1.5

Announcing Graylog 6.1.5 This is a bug-fix release that improves Graylog’s functionality. Please read on for information on what has changed.   Download Links DEB and RPM packages are available in our repositories Container images Graylog Open Graylog Enterprise Graylog Data Node Tarballs for manual installation Graylog Server Graylog Server (bundled JVM, linux-x64) Graylog Server […]

Announcing Graylog 6.0.10

Announcing Graylog 6.0.10 This is a bug-fix release that improves Graylog’s functionality. Please read on for information on what has changed.   Download Links DEB and RPM packages are available in our repositories Container images Graylog Open Graylog Enterprise Graylog Data Node Tarballs for manual installation Graylog Server Graylog Server (bundled JVM, linux-x64) Graylog Server […]