The First Graylog Engineering Hackathon
As part of the blog series written by the Graylog Development Team, today we want to give you some deeper insights into how we approach Engineering. A great example for this is our first-ever Graylog Engineering Hackathon, which we recently completed! Engineering at Graylog – and How We Changed It for the Hackathon At […]
What Is a Data Pipeline
In today’s tech world, IT and security technologies are the functional equivalent of Pokemon. To gain the insights you need, you “gotta catch ‘em all” by ingesting, correlating, and analyzing as much security data as possible. Data pipelines organize chaotic information flows into structured streams, ensuring that data is reliable, processed, and ready for […]
MCP Explained: Conversational AI for Graylog
Quick Overview Model Context Protocol (MCP) gives large language models (LLMs) a secure way to interact with your Graylog data and workflows. Instead of writing complex queries, you can ask questions in plain English, such as: “Which inputs are active?” “How much disk space is my Graylog server using?” Get real-time answers grounded in your […]
7 Steps to an Efficient Security Operations Center Design
In the original Star Trek television show, Captain Kirk would slightly recline in a command chair with various buttons that allowed him to deploy different technologies. Regardless of the alien threat, he had the necessary tools at his disposal to protect the Enterprise and his staff. An organization’s security operations center (SOC) acts as […]
What’s New in Graylog 7.0 Webinar
SIEM & Log Management — Without Compromise When: Wednesday, November 12, 11AM ET Who: Graylog Enterprise & Security customers and Graylog Open users Join us for a 30-minute walkthrough of the Graylog 7.0 Fall ’25 Release — built to make every analyst faster and every decision clearer. Graylog 7.0 brings explainable AI, guided […]
Gobbling Up Insights: Graylog 7.0 Serves Up a Feast
A feast of new features. A cornucopia of new capabilities. A banquet of breakthroughs (and the T-day puns are just getting started). Graylog 7.0 brings a full plate of advancements that help security teams cut through noise, control cloud costs, and respond with confidence. We’re serving practical improvements across dashboards, automation, and AI support so […]
Sliding Through Log-Time Space
This post kicks off a new series written by the Graylog Development Team. In these updates, we’ll highlight the features and fixes that make daily work in Graylog smoother. We want to show the work we care so much about and present the challenges we faced and overcame. Today, we’re starting with one of those […]
Overcoming Cybersecurity and Risk Management Challenges
Every time you leave your home, you take various risks, like being in a car accident or being struck down by a meteor. In some cases, like the meteor, the likelihood of the event is so low as to be nearly nonexistent. In others, like the car accident, the likelihood might be higher. Similarly, every […]
How Graylog Uses Explainable AI to Help Security Teams
Security teams face an endless stream of alerts, false positives, and investigation backlogs. Every second counts, yet many AI-driven tools promise to handle everything for you that leaves analysts uncertain about how conclusions were made. Graylog takes a different path. The company develops assistive AI that helps analysts make faster, smarter calls with context, transparency, […]
SIEM’s Next Chapter: Evolving, Not Dying
The obituary for SIEM has been written more than once. The latest headline from Dark Reading calls it “dying a slow death.” Catchy. But wrong. If you work in a SOC, you already know the need for centralized, contextualized visibility is not going anywhere. What is changing the future of SIEM, is how SIEM delivers […]
How Graylog Helps You Spot LockBit-Style Attacks Sooner
The DFIR Report recently detailed a LockBit attack with ransomware intrusion that succeeded without advanced exploits or zero-day vulnerabilities. The attack relied on a stolen AnyDesk installer, credential reuse, and renamed PowerShell scripts that blended into routine activity. These moves were not sophisticated, but they were fast and effective. The end result: complete domain encryption. […]
The Value of a Robust Vulnerability Management Program
Back before live security video feeds in homes, people would walk around at night checking to make sure they locked every window and door. They took these precautions because they knew that a single open lock gave burglars an opportunity to steal from them. For organizations, vulnerability management programs are a way to lock […]