The Graylog Blog
10 Things To Look For In an MSSP
There are several must-have capabilities to look for in a Managed Security Service Provider (MSSP), and these are 10 of the most essential ones.
Integrating Threat Intelligence into Graylog 3+
How to use the Threat Intelligence plugin and integrate it into Graylog 3+.
Next-Level Threat Hunting: Shift Your SIEM from Reactive to Proactive
Shift your SIEM from reactive to proactive to start leveling up your threat hunting capabilities.
Using Event Logs To Tighten Up Security
A huge volume of our personal and financial data depends on software code and databases. All of this information is stored in event logs, which is why having a dedicated log management tool is so important to IT security.
How to Read Log Files on Windows, Mac, and Linux
This post focuses on log files created by the three main operating systems--Windows, Mac, and Linux, and the main ways to access and read log files for each OS.
Must-Have Features for Your Log Management Software
With so many choices available to us today, knowing what you need in your log management software can be difficult. Here are some tips on what features you should look for.
Server Log Files in a Nutshell
Where do server requests come from and why? You can find this information and more in server log files.
Improving the Signal-to-Noise Ratio in Threat Detection
It’s unrealistic and cost-prohibitive for analysts to spot every threat. To avoid becoming a statistic, improve your threat intelligence signal-to-noise ratio to ensure real threats get the most attention.