SIEM & Log Management — Without Compromise When: Wednesday, November 12, 11AM ET Who: Graylog Enterprise & Security customers and Graylog Open users Join us for a 30-minute walkthrough
SIEM & Log Management — Without Compromise When: Wednesday, November 12, 11AM ET Who: Graylog Enterprise & Security customers and Graylog Open users Join us for a 30-minute walkthrough
A feast of new features. A cornucopia of new capabilities. A banquet of breakthroughs (and the T-day puns are just getting started). Graylog 7.0 brings a full plate of advancements
This post kicks off a new series written by the Graylog Development Team. In these updates, we’ll highlight the features and fixes that make daily work in Graylog smoother. We
Every time you leave your home, you take various risks, like being in a car accident or being struck down by a meteor. In some cases, like the meteor, the
Security teams face an endless stream of alerts, false positives, and investigation backlogs. Every second counts, yet many AI-driven tools promise to handle everything for you that leaves analysts uncertain
Security operations are buried under too many tools. Analysts switch between consoles, piece together context by hand, and burn valuable hours reconciling data that should already work together. According to
The obituary for SIEM has been written more than once. The latest headline from Dark Reading calls it “dying a slow death.” Catchy. But wrong. If you work in a
The DFIR Report recently detailed a LockBit attack with ransomware intrusion that succeeded without advanced exploits or zero-day vulnerabilities. The attack relied on a stolen AnyDesk installer, credential reuse, and
There’s a quiet failure at the heart of many security programs. It’s not a lack of data. It’s too much of the wrong data. Telemetry pipelines built for volume, not
Back before live security video feeds in homes, people would walk around at night checking to make sure they locked every window and door. They took these precautions because they
Compliance is not, nor has it ever been, security. Compliance is the spellcheck of the security world. Security is the work that people do every day to implement, enforce, and
When Heathrow, Brussels, and Berlin airports suffered a cyber attack that disrupted their check-in and baggage systems, the fallout was immediate. Flights were canceled, queues stretched through terminals, and staff
In today’s data-driven world, CISOs and senior leadership need to prove that their security programs mitigate risk. Just like grades theoretically quantify how well students understand material their teachers present,
Subscribe to the latest in log management, security, and all things Graylog blog delivered to your inbox once a month.
Products
Follow Us:
GRAYLOG HEADQUARTERS
1301 Fannin St, Ste. 2000
Houston, TX 77002
GRAYLOG COLORADO
1919 14th Street, Suite 700, Office 18
Boulder, CO 80302
GRAYLOG UNITED KINGDOM
34-37 Liverpool Street, 7th Floor
London, EC2M 1PP
United Kingdom
GRAYLOG GERMANY GMBH
Poolstraße 21
20355 Hamburg, Germany
© 2025 Graylog, Inc. All rights reserved