The Graylog Blog
Enhancing AWS security with Graylog centralized logging
Getting AWS logs into a SIEM or centralized log management platform such as Graylog is key to have proactive monitoring and alerting.
Strengthening cybersecurity with log forensic analysis
Forensic analysis is a highly reliable approache to enforce a strong cybersecurity posture, and can be made even more scientific when coupled with wise log management.
Improving IoT security with log management
We know we can strengthen IoT security with a wise log management strategy. But how can we leverage these event logs to improve the cybersecurity of these often extremely vulnerable access points to our systems?
Preventing and mitigating data loss with Graylog
Log management tools such as Graylog can enhance your incident response and management strategies, and help you mitigate the damage when a data loss or breach occur in your database.
The importance of event correlation techniques in SIEM
Event correlation tools are a fundamental instrument in your security information and event management (SIEM) toolbox to detect threats from all sources in real time.
10 Things To Look For In an MSSP
There are several must-have capabilities to look for in a Managed Security Service Provider (MSSP), and these are 10 of the most essential ones.
Integrating Threat Intelligence into Graylog 3+
How to use the Threat Intelligence plugin and integrate it into Graylog 3+.
Next-Level Threat Hunting: Shift Your SIEM from Reactive to Proactive
Shift your SIEM from reactive to proactive to start leveling up your threat hunting capabilities.