The Graylog Blog


Announcing Graylog 2.1.0-beta.3

Today we are releasing the third beta version of Graylog v2.1. It is a feature-complete release of the 2.1 pre-GA series and ready for your feedback. You can find a changelog and an overview of the new features in this post.

Read more >

Visualize and Correlate IDS Alerts with Open Source Tools

Our final post in our three part series on security focuses on configuring IDS alerts in an open source environment. We will walk through integrating the IDS tool, Snort, with Graylog in order to detect and analyze suspicious activity. We will then provide examples of correlating IDS alerts with both network connection and operating system logs using Graylog.

Read more >

Announcing Graylog v2.1.0-beta.2

Today we are releasing the second beta version of Graylog v2.1. It is a feature-complete release of the 2.1 pre-GA series and ready for your feedback. You can find a changelog and overview of new features in this post.

Read more >

A practical approach to Open Source network security monitoring

In this post, the second of our series, we will take a look at how you can analyze network traffic data in order to detect network intrusions. Every phase of intrusion (phases we’ve outlined in our first blog post) will leave traces and with the correct tools in place, you can detect these early on and take countermeasures.

Read more >

Cyber Security: Understanding the 5 Phases of Intrusion

Here at Graylog, we have recently had an increase in conversations with security teams from leading companies and were inspired by Rob Joyce’s presentation at the USENIX Enigma 2016 conference. We want to share our key findings with the Graylog community!

Read more >