Time Zones: A Logger’s Worst Nightmare

When working with log messages, the log message’s timestamp must be accurate. Some problems that incorrect timestamps create include: Difficulty searching for log messages based on specific date/time Alerts not functioning properly Log message timestamp issues are commonly caused by a mismatch of timezones between the log source (device sending the log) and log destination […]
Never Miss a Critical Alert: Graylog 6.0 Elevates Security Alerting with Pushover Integration

Responding rapidly to cyber threats is a make-or-break capability in today’s high-stakes security environment. A missed alert can quickly escalate a minor incident into a major crisis, jeopardizing your organization’s critical assets and hard-earned reputation. A recent IBM study revealed that companies took an average of 237 days to identify a data breach in […]
Alert Notice: OpenSearch V2.14

Please be advised, Graylog is suggesting not to upgrade your OpenSearch Cluster to version 2.14. There are two issues in OpenSearch that will cause two specific issues: 1. Sporatic concurrent_modification_exeptions during query (link) 2. Additional aggregation in search request is changing results. (link) We are working with the OpenSearch Team to help resolve the issues […]
Upgrade to Illuminate 5.1 for Enhanced Security Operations (Requires Graylog 6.0)

Upgrade to Illuminate 5.1 for Enhanced Security Operations (Requires Graylog 6.0) Hey everyone! We’re thrilled to announce the release of Illuminate 5.1, our latest update to the powerful Graylog Illuminate Content Pack. This version brings game-changing new features, especially with extended coverage for Symantec Endpoint Detection and Response (EDR) and Postfix. Plus, we’ve added […]
Threat Detection and Incident Response with MITRE ATT&CK and Sigma Rules

Being a security analyst tracking down threats can feel like being the Wile E. Coyote to an attacker’s Road Runner. You’re fast, but they’re faster. You set up alerts, but they still manage to get past your defenses. You’re monitoring systems, but they’re still able to hide their criminal activities. Threat detection and incident […]
What’s New In Graylog V6.0 Webinar

Join Us! Wed, May 22, 2024 11:00 AM – 11:30 AM EDT Playback here! The latest version of Graylog has been unleashed, and threat detection and incident response (TDIR) just got a lot easier! Join us on Wednesday, 5/22, as we give you a peek under the hood at the capabilities that make Graylog 6.0 […]
What is the MITRE ATT&CK® framework?

As a kid, treasure hunts were fun. Someone gave you clues and a map so you could hunt down whatever hidden item they left for you. However, as a security analyst, your incident investigations often have clues but lack a map. An alert fires. You search through your vast collection of log data. You hope […]
From the Desk Of the VP of Product – Delivering on the Promises of SIEM

I’m thrilled to share some incredibly exciting news – Graylog’s v6.0 is officially here! It’s been quite the journey getting to this point, filled with late nights, endless cups of coffee, and an unwavering commitment from our amazing team. As we unveil this latest version, I can’t help but reflect on how far SIEM technology […]
From The Office Of The CMO

Graylog Has A Brand-New Look! We’re thrilled to introduce Graylog’s fresh, new look! Gone are the days of our stark, albeit eye-catching red, black, and gray. Welcome a vibrant, modern mix of cool blues, greens, and purples! Meet Arti – the Graylog Mascot Arti, the divine overseer of logs, adept at parsing through cosmic cybersecurity […]
Webinar: Graylog and Soc Prime Form Strategic Partnership To Make Threat Detection and Response More Effective and Efficient

Cyber Defense with MITRE Framework: Insights from Graylog and SOC Prime In this 30-minute webinar, you will learn how to identify and neutralize threats faster using the SOC Prime Platform with Graylog. Integrating the two solutions gives you a robust foundation for crisis management and resilience against cyber threats. Key takeaways: SIEM and […]
Three Ways To Remove Complexity in TDIR

Integrations that accelerate detection and response Gartner identified security technology convergence as one of the key trends both in 2022 and 2023 as a necessity to remove complexity in the industry. Especially for Threat Detection and Incident Response (TDIR), simplification continues to resonate with cyber teams overwhelmed by too many tools and the continuous cutting […]
NIST CSF V2: What’s Hot and What’s Not!

NIST is to the US government what The Watcher is to the Marvel universe. In theory, it should simply observe the world around it, but in reality, it responds to evolving threats through interference. Despite the buzz around the update to the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF), you might […]