As part of the blog series written by the Graylog Development Team, today we want to give you some deeper insights into how we approach Engineering. A great example for
As part of the blog series written by the Graylog Development Team, today we want to give you some deeper insights into how we approach Engineering. A great example for
Most teams picture incident response as a linear sprint from alert to resolution. A notification appears, an analyst pivots across screens, a decision gets made, and the workflow moves on.
In today’s tech world, IT and security technologies are the functional equivalent of Pokemon. To gain the insights you need, you “gotta catch ‘em all” by ingesting, correlating, and analyzing
Quick Overview Model Context Protocol (MCP) gives large language models (LLMs) a secure way to interact with your Graylog data and workflows. Instead of writing complex queries, you can ask
In the original Star Trek television show, Captain Kirk would slightly recline in a command chair with various buttons that allowed him to deploy different technologies. Regardless of the alien
SIEM & Log Management — Without Compromise When: Wednesday, November 12, 11AM ET Who: Graylog Enterprise & Security customers and Graylog Open users Join us for a 30-minute walkthrough
A feast of new features. A cornucopia of new capabilities. A banquet of breakthroughs (and the T-day puns are just getting started). Graylog 7.0 brings a full plate of advancements
This post kicks off a new series written by the Graylog Development Team. In these updates, we’ll highlight the features and fixes that make daily work in Graylog smoother. We
Every time you leave your home, you take various risks, like being in a car accident or being struck down by a meteor. In some cases, like the meteor, the
Security teams face an endless stream of alerts, false positives, and investigation backlogs. Every second counts, yet many AI-driven tools promise to handle everything for you that leaves analysts uncertain
Security operations are buried under too many tools. Analysts switch between consoles, piece together context by hand, and burn valuable hours reconciling data that should already work together. According to
The obituary for SIEM has been written more than once. The latest headline from Dark Reading calls it “dying a slow death.” Catchy. But wrong. If you work in a
The DFIR Report recently detailed a LockBit attack with ransomware intrusion that succeeded without advanced exploits or zero-day vulnerabilities. The attack relied on a stolen AnyDesk installer, credential reuse, and
Subscribe to the latest in log management, security, and all things Graylog blog delivered to your inbox once a month.
Subscribe to the latest in log management, security, and all things Graylog blog delivered to your inbox once a month.