Announcing Graylog 6.3
Announcing Graylog 6.3 What’s New in Graylog: Enhanced Security, and More Release date: 2025-06-30 Graylog 6.3 introduces several enhancements aimed at improving data management, security operations, and authentication processes. Detection Chains as Evidence: Every detection chain is now automatically added as evidence in an investigation. That’s one less manual step and a lot more context […]
Security Notice Update #1
Graylog Security Notice – Escalated Privilege Vulnerability Date: 24 June 2025 Severity: High CVE ID: submitted, publication pending Product/Component Affected: All Graylog Editions – Open, Enterprise and Security Summary We have identified a security vulnerability in Graylog that could allow a local or authenticated user to escalate privileges beyond what is assigned. This issue […]
7 SIEM Configurations To Improve Your Time to Value
Whether you’re an Apple fan or not, one of the reasons people buy into their ecosystem is ease of setup across different devices. In a world where people customize the applications on their laptops to cross over with their mobile phones, an easy setup is a key to getting the most value from their devices. […]
Telemetry: What It Is and How it Enables Security
If you have ever built a LEGO set, then you have a general idea of how telemetry works. Telemetry starts with individual data points, just like your LEGO build starts with a box of bricks. In complex IT environments, your security telemetry is spread across different technologies and monitoring tools, just like in a large […]
Getting OpenTelemetry Data Into Graylog
OpenTelemetry is emerging as the common framework for collecting observability data, and for good reason. It’s vendor-neutral, open source, and designed to collect traces, metrics, and logs in a consistent way. But while most of the buzz is around tracing and metrics, let’s not forget: logs are still the backbone of investigation and response. That’s […]
Sigma Specification 2.0: What You Need to Know
Sigma rules have become the security team equivalent of LEGO bricks and systems. With LEGO, people can build whatever they can imagine by connecting different types of bricks. With Sigma Specification 2.0 rules, security teams can create vendor-agnostic detections without being limited by proprietary log formats. In response to the Sigma rules’ popularity, the […]
The Importance of Triage in Incident Response
Gamers of a certain age likely remember the video game Asteroids. You played as a little triangular spacecraft shooting at big space rocks that started traveling towards you slowly at first, then gained speed. As you revolved around trying to protect yourself by shooting them, you inevitably had to make some rapid decisions about which […]
The Value of Data Enrichment in Cybersecurity Data
You’re standing in the grocery store, comparing the nutrition information for two different cereals. The enriched wheat bran cereal has more B12 vitamin content than your favorite sugary one. As an adult, you know that your body needs the additional vitamins in the enriched bran flakes, even if you really want that fruity, sugary hit […]
What’s New in Graylog 6.2 Webinar
What’s New Graylog 6.2: SIEM & Log Management — Without Compromise Update: Replay available When: Wednesday, May 28, 11AM ET Who: Graylog Enterprise & Security customers and Graylog Open users Join us for an exclusive dive into Graylog 6.2 Spring ’25 Release, purpose-built to eliminate the trade-offs traditional Log Management and SIEMs force on your IT, […]
From Alert Fatigue to Focused Response: A New Way Forward for The SOC
We’re all exhausted—both by the problem and by hearing about it. False positives and overwhelming alert volume have long plagued security operations. And despite years of innovation, solutions have remained elusive. Alert volume. Alert fatigue. SOC burnout. This persistent problem puts security teams in a tough position: Enable a broad set of detections to catch […]
Announcing Graylog 6.2
Announcing Graylog 6.2 This is a bug-fix release that improves Graylog’s functionality. Please read on for information on what has changed. Download Links Release date: 2025-04-28 Upgrade notes DEB and RPM packages are available in our repositories Docker Compose Container images: Graylog Open Graylog Enterprise Graylog Data Node Tarballs for manual installation: Graylog Server Graylog […]
Introducing Graylog 6.2: A SIEM Without Compromise
What does it really mean to have a SIEM Without Compromise? For too long, security teams have been stuck in a no-win game—forced to choose between visibility and cost, detection breadth and team capacity, automation, and control. Every decision felt like a trade-off, with real-world consequences: dropped logs, missed alerts, and inconsistent response when it […]