The Graylog Blog
Using Event Logs To Tighten Up Security
A huge volume of our personal and financial data depends on software code and databases. All of this information is stored in event logs, which is why having a dedicated log management tool is so important to IT security.
The Importance of Historical Log Data
Centralized log management brings valuable information to one place. See how Graylog helps you use historical data to get more concrete insights.
Strengthening cybersecurity with log forensic analysis
Forensic analysis is a highly reliable approache to enforce a strong cybersecurity posture, and can be made even more scientific when coupled with wise log management.
Improving IoT security with log management
We know we can strengthen IoT security with a wise log management strategy. But how can we leverage these event logs to improve the cybersecurity of these often extremely vulnerable access points to our systems?
Reporting Up: Recommendations for Log Analysis
This post covers useful categories of information to monitor and report that indicate potential security issues.
How Can the Right Log Aggregator Help Your Enterprise?
The right log aggregation tools can go a long way towards maintaining and improving an existing system easily and efficiently.
Top Use Cases for Log Analysis
There is a wide scope of use cases for log analysis - from tackling security and performance issues head-on to enhancing the quality of your services. This post discusses these use cases in more detail.
Why is Log Management Important?
Today, every important action that occur on our computers, mobile phones, and tablets is logged somewhere, so employing a proper log management solution is now more crucial than ever before.
Investigating the RCE attack that knocked out 900,000 German routers on Sunday
900,000 Deutsche Telekom customers recently suffered repetitive network outages. Could this be a mass-scanning attack similar to how the Mirai botnet was formed?