Announcing Graylog 6.3

Announcing Graylog 6.3 This is a bug-fix release that improves Graylog’s functionality. Please read on for information on what has changed. Release date: 2025-06-30 Upgrade notes DEB and RPM packages are available in our repositories Docker Compose Container images: Graylog Open Graylog Enterprise Graylog Data Node Tarballs for manual installation: Graylog Server Graylog Server (bundled […]
Security Notice Update #1

Graylog Security Notice – Escalated Privilege Vulnerability Date: 24 June 2025 Severity: High CVE ID: submitted, publication pending Product/Component Affected: All Graylog Editions – Open, Enterprise and Security Summary We have identified a security vulnerability in Graylog that could allow a local or authenticated user to escalate privileges beyond what is assigned. This issue […]
7 SIEM Configurations To Improve Your Time to Value

Whether you’re an Apple fan or not, one of the reasons people buy into their ecosystem is ease of setup across different devices. In a world where people customize the applications on their laptops to cross over with their mobile phones, an easy setup is a key to getting the most value from their devices. […]
Telemetry: What It Is and How it Enables Security

If you have ever built a LEGO set, then you have a general idea of how telemetry works. Telemetry starts with individual data points, just like your LEGO build starts with a box of bricks. In complex IT environments, your security telemetry is spread across different technologies and monitoring tools, just like in a large […]
Getting OpenTelemetry Data Into Graylog

OpenTelemetry is emerging as the common framework for collecting observability data, and for good reason. It’s vendor-neutral, open source, and designed to collect traces, metrics, and logs in a consistent way. But while most of the buzz is around tracing and metrics, let’s not forget: logs are still the backbone of investigation and response. That’s […]
Sigma Specification 2.0: What You Need to Know

Sigma rules have become the security team equivalent of LEGO bricks and systems. With LEGO, people can build whatever they can imagine by connecting different types of bricks. With Sigma Specification 2.0 rules, security teams can create vendor-agnostic detections without being limited by proprietary log formats. In response to the Sigma rules’ popularity, the […]
The Importance of Triage in Incident Response

Gamers of a certain age likely remember the video game Asteroids. You played as a little triangular spacecraft shooting at big space rocks that started traveling towards you slowly at first, then gained speed. As you revolved around trying to protect yourself by shooting them, you inevitably had to make some rapid decisions about which […]
Get To Know Graylog GO

Topic Ideas We welcome proposals from Graylog Security and Enterprise customers and Graylog open source users. You don’t need to be a professional speaker—just someone with a story worth telling. Example topics include: Customer success stories Traditional or unique use cases Upgrading from open source to Graylog Enterprise or Graylog Security Migration to Graylog 6.1 […]
The Value of Data Enrichment in Cybersecurity Data

You’re standing in the grocery store, comparing the nutrition information for two different cereals. The enriched wheat bran cereal has more B12 vitamin content than your favorite sugary one. As an adult, you know that your body needs the additional vitamins in the enriched bran flakes, even if you really want that fruity, sugary hit […]
What’s New in Graylog 6.2 Webinar

What’s New Graylog 6.2: SIEM & Log Management — Without Compromise Update: Replay available When: Wednesday, May 28, 11AM ET Who: Graylog Enterprise & Security customers and Graylog Open users Join us for an exclusive dive into Graylog 6.2 Spring ’25 Release, purpose-built to eliminate the trade-offs traditional Log Management and SIEMs force on your IT, […]
From Alert Fatigue to Focused Response: A New Way Forward for The SOC

We’re all exhausted—both by the problem and by hearing about it. False positives and overwhelming alert volume have long plagued security operations. And despite years of innovation, solutions have remained elusive. Alert volume. Alert fatigue. SOC burnout. This persistent problem puts security teams in a tough position: Enable a broad set of detections to catch […]
Announcing Graylog 6.2

Announcing Graylog 6.2 This is a bug-fix release that improves Graylog’s functionality. Please read on for information on what has changed. Download Links Release date: 2025-04-28 Upgrade notes DEB and RPM packages are available in our repositories Docker Compose Container images: Graylog Open Graylog Enterprise Graylog Data Node Tarballs for manual installation: Graylog Server Graylog […]