Why a People-Centric Security Strategy Improves Resilience

Why a People-Centric Security Strategy Improves Resilience

If Darth Vader and the rest of the Empire made one major strategic mistake, it was failing to understand the important role that the human element plays in security. Convinced of their superiority, the Empire’s leaders assumed that the Death Star was impenetrable. However, in the end, it was a scientist and his team who […]

Understanding How a Log Correlation Engine Enables Real-Time Insights

Understanding How a Log Correlation Engine Enables Real-Time Insights

Tax season is notoriously most people’s least favorite time of year. For people who complete their own tax returns, the process becomes an agonizing one of looking at small pieces of paper, matching numbers to the lines that ask for information, and comparing various inputs. In essence, doing your taxes makes you a correlation engine. […]

The First Graylog Engineering Hackathon

The First Graylog Engineering Hackathon

As part of the blog series written by the Graylog Development Team, today we want to give you some deeper insights into how we approach Engineering. A great example for this is our first-ever Graylog Engineering Hackathon, which we recently completed!   Engineering at Graylog – and How We Changed It for the Hackathon At […]

What Is a Data Pipeline

What Is a Data Pipeline

In today’s tech world, IT and security technologies are the functional equivalent of Pokemon. To gain the insights you need, you “gotta catch ‘em all” by ingesting, correlating, and analyzing as much security data as possible.   Data pipelines organize chaotic information flows into structured streams, ensuring that data is reliable, processed, and ready for […]

MCP Explained: Conversational AI for Graylog

MCP Explained: Conversational AI for Graylog

Quick Overview Model Context Protocol (MCP) gives large language models (LLMs) a secure way to interact with your Graylog data and workflows. Instead of writing complex queries, you can ask questions in plain English, such as: “Which inputs are active?” “How much disk space is my Graylog server using?” Get real-time answers grounded in your […]

7 Steps to an Efficient Security Operations Center Design

7 Steps to an efficient security operations center design

In the original Star Trek television show, Captain Kirk would slightly recline in a command chair with various buttons that allowed him to deploy different technologies. Regardless of the alien threat, he had the necessary tools at his disposal to protect the Enterprise and his staff.   An organization’s security operations center (SOC) acts as […]

What’s New in Graylog 7.0 Webinar

What's New in Graylog V7.0 Webinar

SIEM & Log Management — Without Compromise   When: Wednesday, November 12, 11AM ET Who: Graylog Enterprise & Security customers and Graylog Open users   Join us for a 30-minute walkthrough of the Graylog 7.0 Fall ’25 Release — built to make every analyst faster and every decision clearer. Graylog 7.0 brings explainable AI, guided […]

Gobbling Up Insights: Graylog 7.0 Serves Up a Feast

Graylog 7.0 Serves Up a Feast

A feast of new features. A cornucopia of new capabilities. A banquet of breakthroughs (and the T-day puns are just getting started). Graylog 7.0 brings a full plate of advancements that help security teams cut through noise, control cloud costs, and respond with confidence. We’re serving practical improvements across dashboards, automation, and AI support so […]

Sliding Through Log-Time Space

Sliding Through Log-Time Space

This post kicks off a new series written by the Graylog Development Team. In these updates, we’ll highlight the features and fixes that make daily work in Graylog smoother. We want to show the work we care so much about and present the challenges we faced and overcame. Today, we’re starting with one of those […]

Overcoming Cybersecurity and Risk Management Challenges

Overcoming Cybersecurity and Risk Management Challenges

Every time you leave your home, you take various risks, like being in a car accident or being struck down by a meteor. In some cases, like the meteor, the likelihood of the event is so low as to be nearly nonexistent. In others, like the car accident, the likelihood might be higher. Similarly, every […]

How Graylog Uses Explainable AI to Help Security Teams

How Graylog Uses Explainable AI to Help Security Teams

Security teams face an endless stream of alerts, false positives, and investigation backlogs. Every second counts, yet many AI-driven tools promise to handle everything for you that leaves analysts uncertain about how conclusions were made. Graylog takes a different path. The company develops assistive AI that helps analysts make faster, smarter calls with context, transparency, […]

SIEM’s Next Chapter: Evolving, Not Dying

SIEM's Next Chapter: Evolving, Not Dying

The obituary for SIEM has been written more than once. The latest headline from Dark Reading calls it “dying a slow death.” Catchy. But wrong. If you work in a SOC, you already know the need for centralized, contextualized visibility is not going anywhere. What is changing the future of SIEM, is how SIEM delivers […]