Cyber Defense with MITRE Framework | Graylog + SOC Prime | On-Demand Webinar >>

The Graylog blog

Be Cybersmart with Graylog

It’s that time of year when the skeletons and pumpkins are in the windows and the bad actors are lurking in the shadows of your network. Don’t get phished by the bucket of candy.

Each Tuesday during October, Graylog will post blogs on the Cybersecurity Awareness month topics:

  • Week of October 4 (Week 1): Be Cyber Smart.
  • Week of October 11 (Week 2): Phight the Phish!
  • Week of October 18 (Week 3): Explore. Experience. Share. – Cybersecurity Career Awareness Week
  • Week of October 25 (Week 4): Cybersecurity First

THE RISING TIDE OF DATA BREACH AWARENESS

Be Cyber Smart

The old saying “there’s no such thing as bad publicity” doesn’t ring true when it comes to data breaches and ransomware attacks. High-profile security incidents might be making headlines, but those headlines are impacting companies’ bottom lines. In response, the US federal government is modernizing its own cybersecurity infrastructure and establishing new agency compliance mandates. Businesses need to stay aware as best practices change and start modernizing their own security infrastructures.

Read the blog post

SECURITY AWARENESS AND LOG MANAGEMENT FOR SECURITY ANALYSTS

Phight the Phish

Security analysts live and breathe cybersecurity awareness. They don’t need phishing training or web-surfing hygiene lessons. However, where does that leave them when it comes to security awareness month? To continue to fight the good fight, security analysts need cybersecurity awareness training around how to optimize their log management strategies so that they can keep pace with threat actors.

Read the blog post

A CISO’S GUIDE TO LOG MANAGEMENT FOR CYBERSECURITY

Explore, Experience, Share

CISOs face two big problems: protecting data and reporting their activities to the Board. CISOs know that log management is fundamental to protecting data, but high volumes of data generated by cloud applications make using logs difficult. Meanwhile, many CISOs purchase security technologies based on the reports that the tool generates. With modernized log management, CISOs can get the best of both worlds: the visibility they need and the visibility they need to provide.

Read the blog post

SMALL IT TEAMS WITH BIG SECURITY PROBLEMS

Cybersecurity First

Small IT teams face the same big security problems as large SOCs. They just have fewer – or no – specialists. This makes their smaller teams a bigger target for threat actors. Centralized log management gives small IT teams a way to manage both security and operations so that they can do more with less.

Read the blog post

Watch this space and happy Logging!

Get the Monthly Tech Blog Roundup

Subscribe to the latest in log management, security, and all things Graylog Blog delivered to your inbox once a month.