2020 MUST READS
Security, availability, and performance were the focus for companies navigating the changing workspace in 2020. As a holiday treat, each day, Graylog will present you with the blog posts, videos, and recorded webinars that our website visitors looked at for guidance on how to keep their IT infrastructure secure, available, and optimized.
LOG MANAGEMENT AND GRAYLOG ALERTS – KEEPING TRACK OF EVENTS IN REAL-TIME
A critical component of every logging tool, alerts can tell you whether an event is something you want to check out rather than just normal activity you want to ignore. Alerts played a key role in keeping the organization’s infrastructure secure, available, and optimized during 2020, when IT teams needed to be prepared and ready to take action.
DETECTING & PREVENTING RANSOMWARE THROUGH LOG MANAGEMENT
As companies responded to the COVID-19 pandemic with remote work, cybercriminals increased their social engineering and ransomware attack methodologies. Detection of ransomware through log management protects and secures your systems, networks, devices, and applications.
THE IMPORTANCE OF LOG MONITORING IN ANOMALOUS BEHAVIOR ANALYTICS
Anomalous behavior analytics is one of the many advantages that big data analytics brings to the table. What role does log monitoring have in and how does it work together with behavioral analytics?
THE IMPORTANCE OF LOG MANAGEMENT AND CYBERSECURITY
More users, data, and devices connected to your networks mean more monitoring for cyber attacks. Centralized log management supports cybersecurity by detecting suspicious activity before or during the forensic investigation.
The Graylog Virtual Christmas Party
Friday is fun day. Gary, the intrepid feline reporter, shares his experience at the Graylog Christmas Party.
USING PIPELINES FOR WINDOWS LOG PROCESSING
Pipelines and Data Adapters enrich logs to make them more functional and easier for you to read.
Setting Up Events & Alerts in Graylog
Alerts can give real-time notice of an attack, or advance notice of an attack so that you can take steps to prevent or minimize it. While alerts have always been a key part of centralized log management, they became even more important with a distributed workforce.
HOW TO SET UP GRAYLOG GEOIP CONFIGURATION
Gathering logs that contain IP addresses are quite common across your infrastructure. Having additional data on those logs that give you the Geolocation of the IP address helps your investigations and understanding of your traffic patterns.
Season 2: Getting Value Out of Graylog
Key features and functionality in Graylog working together to bring you value.
The Educational Meow Heard Across the World
Friday is fun day. Gary, the intrepid feline reporter talks about his most memorable moments of 2020.
THE IMPORTANCE OF HISTORICAL LOG DATA
Analyzing a specific incident often means looking back in time. Working with historical data in Graylog is how companies find information fast.
LOG FORMATS – A (MOSTLY) COMPLETE GUIDE
Log collection didn’t stop when the workforce moved from office to home office. However, the log type, devices, and systems, etc. often did change.
Tech Talks Season 1: Ensuring Security & Availability For Remote Workers
The workforce goes remote. Performance and security are top of mind.