Skip to content

Outgrown Your Free Graylog? | 6 Reasons to Upgrade | Learn more >>>

Graylog logo blue
  • Solutions
    • Graylog Security
    • Graylog Enterprise
    • Graylog Open
    • Graylog API Security
    • Graylog Illuminate
    • Graylog Cloud

    Graylog Security

    Graylog Enterprise

    Graylog Open

    Graylog API Security

    Free Tools
    Open vs. Paid
    Features Deep Dive
    Use Cases
  • Learn
    • About
    • Resource Library
    • Events
    • Academy
    • Blog

    About Graylog

    Resource Library

    Events

    Academy

    Blog

  • Support
    • Customer Support
    • Documentation
    • Open Community

    Customer Support

    Cloud Platform

    Documentation

    Open Community

    Pro Services

  • Contact Us
  • Pricing
Graylog logo blue
Free Tools
See Demo
Graylog logo blue
  • Solutions
    • Graylog Security
    • Graylog Enterprise
    • Graylog Open
    • Graylog API Security
    • Graylog Illuminate
    • Graylog Cloud

    Graylog Security

    Graylog Enterprise

    Graylog Open

    Graylog API Security

    Free Tools
    Open vs. Paid
    Features Deep Dive
    Use Cases
  • Learn
    • About
    • Resource Library
    • Events
    • Academy
    • Blog

    About Graylog

    Resource Library

    Events

    Academy

    Blog

  • Support
    • Customer Support
    • Documentation
    • Open Community

    Customer Support

    Cloud Platform

    Documentation

    Open Community

    Pro Services

  • Contact Us
  • Pricing
Graylog logo blue
Free Tools
See Demo
Picture of Jeff Darrington

Jeff Darrington

Jeff Darrington is Graylog's Director, Technical Marketing. He is a long-time Graylog OS user with extensive experience in IT Operations, IT product solutions deployment in Firewalls, Networking, VOIP, Physical security Controls, and many others.
Best Practices for Writing an IT Security Incident Report

Best Practices for Writing an IT Security Incident Report

November 8, 2024
IOT Formats Azure and AWS

Understanding IoT Logging Formats in Azure and AWS

November 4, 2024
Cross Site Request Forgery Cheat Sheet

Cross-Site Request Forgery Cheat Sheet

October 31, 2024
What is an XSS Attack

What is a Cross-Site Scripting Attack

October 28, 2024

Understanding Java Logs

October 18, 2024
What is NIST 800-53

What is NIST 800-53?

September 27, 2024
Logs in A SIEM

Logs in a SIEM: The Liquid Gold of Cybersecurity

September 25, 2024

Creating an Incident Response Process

September 20, 2024
A DNS Chat between Grayloggers

When DNS Says: Talk To The Hand!

September 17, 2024
Graylog GO

Graylog Go 2024: Registration Open

September 15, 2024
Linux Logs to Collect and Monitor

25 Linux Logs to Collect and Monitor

September 12, 2024

Python Logs: What They Are and Why They Matter

September 4, 2024
« Previous Page1 Page2 Page3 Page4 Page5 Page6 Page7 Page8 Page9 Page10 Page11 Next »

Products

Graylog Security
Graylog Enterprise
Graylog Open
Graylog API Security
Graylog Cloud
Graylog Illuminate
Graylog Small Business
Pricing

Features

Access Control & Audit Logs
UEBA Anomaly Detection
Graylog Content: Illuminate
Data Collection
Data Enrichment
Data Management
Events & Alerts
Investigations
Reports & Dashboards
Risk Management
Scalable Architecture
Search
SOAR

LEARN

Resource Hub
Blog
Videos
Events
Community

SUPPORT

Customer Support
Documentation
Graylog Academy
Open Community

Company

About
Leadership
Partners
Careers
News & Awards
Contact

[email protected]

Follow Us:

Linkedin Reddit-alien Youtube Github Facebook-f
Graylog Available in AWS Marketplace

GRAYLOG HEADQUARTERS

1301 Fannin St, Ste. 2000
Houston, TX 77002

GRAYLOG COLORADO

1919 14th Street, Suite 700, Office 18
Boulder, CO 80302

GRAYLOG UNITED KINGDOM

34-37 Liverpool Street, 7th Floor
London, EC2M 1PP
United Kingdom

GRAYLOG GERMANY GMBH

Poolstraße 21
20355 Hamburg, Germany

© 2025 Graylog, Inc. All rights reserved

Privacy Policy | Legal | Sitemap