WHAT YOU NEED TO KNOW ABOUT ITIL FOR SERVICE MANAGEMENT
As the person on the front lines, you know that providing the best service possible can be what makes your ITSM organization succeed.
SECURITY AWARENESS AND LOG MANAGEMENT FOR SECURITY ANALYSTS
For today’s remote workforce, security professionals need technical security awareness education distinct from the rest of the company’s “don’t click a phishing link” training.
Ultimate Guide to Sigma Rules
Leverage sigma rules capabilities to optimize your centralized log management solution for security detection and response.
How To Guide: Secure Graylog with TLS
Get ready to secure your Graylog Server with TLS for enhanced data protection!
DIGITAL OPERATIONAL RESILIENCE ACT
The financial services industry has been a threat actor target since before digital ...
With so many choices available to us today, knowing what you need in your log management software can be difficult. Here are some tips on what features you should look
For log management, it is more efficient to move the logs to a central place and process them there. See how Graylog serves as the sawmill and joiner for your
Learn the difference between structured and unstructured logs, the basics of the JSON log format, what kind of information you can get when you parse log files, and which tools
Modern enterprises generate an immense volume of data, and Big Data increases the complexity with its high variety and velocity. But a robust log management solution can help you filter
900,000 Deutsche Telekom customers recently suffered repetitive network outages. Could this be a mass-scanning attack similar to how the Mirai botnet was formed?
We want to introduce you to [Graylog Labs] (https://github.com/graylog-labs), a new Github organization created by the core team at Graylog! Graylog Labs will be the home for all repositories that
We started the Graylog project envisioning an end-to-end, purpose built log management solution. Over the last few years, we’ve been focused on fulfilling this mission of delivering the world’s best
In this blog post we'll set up the required AWS resources, configure the Graylog input, and do some basic searches to explore the capabilities of Cloudtrail logs.
It’s unrealistic and cost-prohibitive for analysts to spot every threat. To avoid becoming a statistic, improve your threat intelligence signal-to-noise ratio to ensure real threats get the most attention.
This post focuses on log files created by the three main operating systems--Windows, Mac, and Linux, and the main ways to access and read log files for each OS.