The Graylog Blog
Cyber Security Mega Breaches: Best Practices & Log Management
Nick Carstensen of Graylog Outlines Lessons Learned from Recent Headline-Makers
Making data-driven decisions with log management software
Data-driven decisions certainly are more reliable than those based upon mere instinct, and logs are a fantastic source of information to fuel a company's business intelligence strategies.
Turning Unstructured Data Into Structured Data With Log Management Tools
What makes data structured or unstructured and how does that affect your logging efforts and information gain?
Improve Your Logging Efforts by Leveraging Your Search History
In this article, we will discuss some ways to get the best out of your saved searches and to speed up the search process.
Enhancing AWS security with Graylog centralized logging
Getting AWS logs into a SIEM or centralized log management platform such as Graylog is key to have proactive monitoring and alerting.
Strengthening cybersecurity with log forensic analysis
Forensic analysis is a highly reliable approache to enforce a strong cybersecurity posture, and can be made even more scientific when coupled with wise log management.
The Importance of Log Monitoring in Anomalous Behavior Analytics
What role does log monitoring have in intrusion detection and prevention and how does it work together with behavioral analytics?
Improving IoT security with log management
We know we can strengthen IoT security with a wise log management strategy. But how can we leverage these event logs to improve the cybersecurity of these often extremely vulnerable access points to our systems?
Troubleshooting with Log Management - Best Practices
Troubleshooting is centered on first identifying and then rectifying problems within the system. Since logs record all kinds of event data, proper log management is a crucial step to figuring out exactly what went wrong - as well as when and how.