Graylog Geolocation: Mapping Your Log Data

In today’s distributed work environment, understanding the geographic origin of network traffic has become more crucial than ever. As organizations adapt to remote work, IT teams face the challenge of monitoring and analyzing an expanding array of IP addresses from various locations. Graylog’s geolocation feature offers a powerful solution to this challenge, allowing teams to […]
GraylogGO: Call For Speakers

Help us shape the Graylog GO agenda! We’re looking for dynamic speakers to share their experiences and insights with our virtual community. Whether your expertise is in using Graylog for cybersecurity or log management, your voice can make a difference. What Are We Looking For? Solving Cybersecurity Problems With These Tracks This track explores advanced […]
Time Zones: A Logger’s Worst Nightmare

When working with log messages, the log message’s timestamp must be accurate. Some problems that incorrect timestamps create include: Difficulty searching for log messages based on specific date/time Alerts not functioning properly Log message timestamp issues are commonly caused by a mismatch of timezones between the log source (device sending the log) and log destination […]
Critical Windows Event ID’s to Monitor

Like most organizations, your company likely invested in various Microsoft products. The Microsoft ecosystem provides businesses with nearly every kind of technology necessary, from workstation operating systems to Azure to Windows 365 that includes cloud-native versions of their traditional Office tools and the communication platform Teams. However, attackers are just as invested in the Microsoft […]
Never Miss a Critical Alert: Graylog 6.0 Elevates Security Alerting with Pushover Integration

Responding rapidly to cyber threats is a make-or-break capability in today’s high-stakes security environment. A missed alert can quickly escalate a minor incident into a major crisis, jeopardizing your organization’s critical assets and hard-earned reputation. A recent IBM study revealed that companies took an average of 237 days to identify a data breach in […]
Alert Notice: OpenSearch V2.14

Please be advised, Graylog is suggesting not to upgrade your OpenSearch Cluster to version 2.14. There are two issues in OpenSearch that will cause two specific issues: 1. Sporatic concurrent_modification_exeptions during query (link) 2. Additional aggregation in search request is changing results. (link) We are working with the OpenSearch Team to help resolve the issues […]
Upgrade to Illuminate 5.1 for Enhanced Security Operations (Requires Graylog 6.0)

Upgrade to Illuminate 5.1 for Enhanced Security Operations (Requires Graylog 6.0) Hey everyone! We’re thrilled to announce the release of Illuminate 5.1, our latest update to the powerful Graylog Illuminate Content Pack. This version brings game-changing new features, especially with extended coverage for Symantec Endpoint Detection and Response (EDR) and Postfix. Plus, we’ve added […]
Threat Detection and Incident Response with MITRE ATT&CK and Sigma Rules

Being a security analyst tracking down threats can feel like being the Wile E. Coyote to an attacker’s Road Runner. You’re fast, but they’re faster. You set up alerts, but they still manage to get past your defenses. You’re monitoring systems, but they’re still able to hide their criminal activities. Threat detection and incident […]
What’s New In Graylog V6.0 Webinar

Join Us! Wed, May 22, 2024 11:00 AM – 11:30 AM EDT Playback here! The latest version of Graylog has been unleashed, and threat detection and incident response (TDIR) just got a lot easier! Join us on Wednesday, 5/22, as we give you a peek under the hood at the capabilities that make Graylog 6.0 […]
What is the MITRE ATT&CK® framework?

As a kid, treasure hunts were fun. Someone gave you clues and a map so you could hunt down whatever hidden item they left for you. However, as a security analyst, your incident investigations often have clues but lack a map. An alert fires. You search through your vast collection of log data. You hope […]
From the Desk Of the VP of Product – Delivering on the Promises of SIEM

I’m thrilled to share some incredibly exciting news – Graylog’s v6.0 is officially here! It’s been quite the journey getting to this point, filled with late nights, endless cups of coffee, and an unwavering commitment from our amazing team. As we unveil this latest version, I can’t help but reflect on how far SIEM technology […]
From The Office Of The CMO

Graylog Has A Brand-New Look! We’re thrilled to introduce Graylog’s fresh, new look! Gone are the days of our stark, albeit eye-catching red, black, and gray. Welcome a vibrant, modern mix of cool blues, greens, and purples! Meet Arti – the Graylog Mascot Arti, the divine overseer of logs, adept at parsing through cosmic cybersecurity […]