Telemetry: What It Is and How it Enables Security

Telemetry What it is and How It Enables Security

If you have ever built a LEGO set, then you have a general idea of how telemetry works. Telemetry starts with individual data points, just like your LEGO build starts with a box of bricks. In complex IT environments, your security telemetry is spread across different technologies and monitoring tools, just like in a large […]

Getting OpenTelemetry Data Into Graylog

OpenTelemetry Data into Graylog

OpenTelemetry is emerging as the common framework for collecting observability data, and for good reason. It’s vendor-neutral, open source, and designed to collect traces, metrics, and logs in a consistent way. But while most of the buzz is around tracing and metrics, let’s not forget: logs are still the backbone of investigation and response. That’s […]

Sigma Specification 2.0: What You Need to Know

Sigma Specification V2.0 what you need to know

Sigma rules have become the security team equivalent of LEGO bricks and systems. With LEGO, people can build whatever they can imagine by connecting different types of bricks. With Sigma Specification 2.0 rules, security teams can create vendor-agnostic detections without being limited by proprietary log formats.   In response to the Sigma rules’ popularity, the […]

The Importance of Triage in Incident Response

Triage and Incident response

Gamers of a certain age likely remember the video game Asteroids. You played as a little triangular spacecraft shooting at big space rocks that started traveling towards you slowly at first, then gained speed. As you revolved around trying to protect yourself by shooting them, you inevitably had to make some rapid decisions about which […]

The Value of Data Enrichment in Cybersecurity Data

Value of Data Enrichment for Cybersecurity

You’re standing in the grocery store, comparing the nutrition information for two different cereals. The enriched wheat bran cereal has more B12 vitamin content than your favorite sugary one. As an adult, you know that your body needs the additional vitamins in the enriched bran flakes, even if you really want that fruity, sugary hit […]

What’s New in Graylog 6.2 Webinar

What's New In 6.2 Webinar

What’s New Graylog 6.2: SIEM & Log Management — Without Compromise Update: Replay available When: Wednesday, May 28, 11AM ET Who: Graylog Enterprise & Security customers and  Graylog Open users Join us for an exclusive dive into Graylog 6.2 Spring ’25 Release, purpose-built to eliminate the trade-offs traditional Log Management and SIEMs force on your IT, […]

From Alert Fatigue to Focused Response: A New Way Forward for The SOC

From Alert Fatigue to focused response

We’re all exhausted—both by the problem and by hearing about it. False positives and overwhelming alert volume have long plagued security operations. And despite years of innovation, solutions have remained elusive. Alert volume. Alert fatigue. SOC burnout. This persistent problem puts security teams in a tough position: Enable a broad set of detections to catch […]

Announcing Graylog 6.2

Announcing Graylog 6.2 This is a bug-fix release that improves Graylog’s functionality. Please read on for information on what has changed. Download Links Release date: 2025-04-28 Upgrade notes DEB and RPM packages are available in our repositories Docker Compose Container images: Graylog Open Graylog Enterprise Graylog Data Node Tarballs for manual installation: Graylog Server Graylog […]

Introducing Graylog 6.2: A SIEM Without Compromise

Introducing Graylog 6.2: A SIEM Without Compromise

What does it really mean to have a SIEM Without Compromise?  For too long, security teams have been stuck in a no-win game—forced to choose between visibility and cost, detection breadth and team capacity, automation, and control. Every decision felt like a trade-off, with real-world consequences: dropped logs, missed alerts, and inconsistent response when it […]

Announcing Graylog 6.1.10

Announcing Graylog 6.1.10 This is a bug-fix release that improves Graylog’s functionality. Please read on for information on what has changed. Download Links Release date: 2025-04-03 DEB and RPM packages are available in our repositories Docker Compose Container images: Graylog Open Graylog Enterprise Graylog Data Node Tarballs for manual installation: Graylog Server Graylog Server (bundled […]

Graylog Testing IPoAC for Redundancy

RFC1149 (IPoAC) for Ultra-Resilient Log Delivery In modern distributed environments, where systems are spread across continents and uptime is non-negotiable, the need for robust, fault-tolerant log transport mechanisms has never been greater. At Graylog, we are committed to ensuring that your observability infrastructure can handle even the most extreme network disruptions—planned or otherwise. This is […]

Best Practices To Manage Cybersecurity for Digital Manufacturing

Cybersecurity for Digital Manufacturing

Like every industry, the manufacturing sector has embraced digital transformation to improve operations. Digital manufacturing uses technologies like Internet of Things (IoT) devices, data analytics, and cloud computing to improve production processes and gain efficiencies.   With businesses increasingly embracing digital transformation, they face the challenge of securing interconnected systems. Cybercriminals target the manufacturing industry […]