Anomaly Detection with Machine Learning to Improve Security
Learn how machine-learningβdriven anomaly detection enhances security and performance by identifying behavioral deviations in real time. Explore how enriched logs, behavioral baselines, and automated ...
Security today is βWhereβs Waldoβ at terabyte scale.
ML-powered anomaly detection helps teams spot the behaviors that donβt fit the norm, from zero-days to insider threats without drowning in alerts.
Click here: graylog.org/post/anomaly...
#CyberSecurity #MachineLearning #Graylog
04.02.2026 14:57 β π 1 π 0 π¬ 0 π 0
Observability vs Monitoring: Getting a Full Picture of the Environment
Gain insights into observability and monitoring, two key concepts in maintaining system health. Explore their roles and how they complement each other.
Monitoring detects issues β observability helps you understand why they happen.
In modern distributed systems, you need both.
New blog: Monitoring vs. Observability + the pillars of telemetry (logs, metrics, traces).
π graylog.org/post/observa...
#Observability #DevOps #Graylog
02.02.2026 16:40 β π 2 π 0 π¬ 0 π 0
Compliance Readiness with Audit Logging
Strengthen compliance readiness with centralized audit logging, real-time analytics, and automated reporting powered by parsed, normalized, and correlated data.
Audit logs arenβt just βlogsβ. Theyβre proof.
Who acted? What changed? When? Where?
Discover audit logging basics, log types, compliance use cases, and best practices for security.
π graylog.org/post/complia...
#CyberSecurity #Compliance #AuditLogging
29.01.2026 19:31 β π 2 π 0 π¬ 0 π 0
From Atlassian JSON to Actionable Audit Insights
Turn raw Atlassian audit JSON into stable, searchable events. Learn why edge modeling beats pipelines for faster triage, better alerts, and dashboards.
Atlassian audit logs arenβt useless. Theyβre shaped wrong.
Nested JSON and shifting arrays turn simple questions into manual work. Dashboards break. The fix isnβt more parsing in the SIEM. Itβs modeling audit data at the edge.
graylog.org/post/from-at...
#SecurityOperations #SIEM #AuditLogs
28.01.2026 18:55 β π 1 π 0 π¬ 0 π 0
Kubernetes Logging Best Practices
Enhance your Kubernetes logging skills with these best practices. Ensure efficient log management for improved performance and error tracking.
Kubernetes without good logging is just mystery pings.
This post breaks down:
β’ How Kubernetes logging works
β’ The key log types every cluster generates
β’ Practical best practices for centralization & retention
π graylog.org/post/kuberne...
#Kubernetes #Observability #DevOps #CloudNative #Security
27.01.2026 16:16 β π 3 π 1 π¬ 0 π 0
How to Ignore Cybersecurity AI Bubble FOMO
AI FOMO is hitting the SOC. Prepare security operations for an AI bubble correction with execution discipline, clarity, and workflows.
AI pressure is already hitting the SOC.
Boards want ROI. Teams inherit risk.
The issue isnβt AIβitβs tools that add noise, unchecked automation, and zero proof of impact.
7 bubble-proof moves to invest in AI you can defend.
Read more: graylog.org/post/how-to-...
#securityAI #SOC #ExplainableAI
22.01.2026 18:45 β π 1 π 0 π¬ 0 π 0
Introducing The First Graylog Helm Chart Beta V1.0.0
Graylog introduces its first supported Helm chart for Kubernetes, available now as a Beta through Graylog Labs.
Weβve released the first-ever Graylog Helm Chart for Kubernetes β now available in beta.
Graylog in K8s using standard Helm workflows, without hiding the important knobs. No duct-taped manifests. No surprises.
graylog.org/post/introdu...
#Kubernetes #graylog
20.01.2026 19:53 β π 3 π 1 π¬ 0 π 0
SIEM Automation to Improve Threat Detection and Incident Response
SIEM automation uses AI, ML, and playbooks to streamline threat detection, investigation, and response with enriched, context-driven alerts.
If your SIEM automation still leaves analysts buried in alerts, itβs not helping. Itβs just louder.
Good automation cuts noise, adds context, and speeds response.
What actually works (and what doesnβt):
π graylog.org/post/siem-au...
14.01.2026 19:29 β π 2 π 1 π¬ 0 π 0
Using LLMs, CVSS, and SIEM Data for Runtime Risk Prioritization
Why LLM-only CVSS scoring fails without SIEM context, and how log-driven AI enables runtime risk prioritization across APIs and infrastructure IT.
Runtime risk isnβt harder to analyze. Itβs easier to misread. A UNC Wilmington study of 31k+ vulns shows LLMs can infer CVSS but fail without runtime context.
The same applies to MITRE mappings. Seth Goldhammer explains why AI needs SIEM data.
graylog.org/post/using-l...
#cybersecurity #SIEM #AI
13.01.2026 19:40 β π 0 π 0 π¬ 0 π 0
Graylog is hiring in the USA!! We are looking for a Director of Revenue Operations and a Solutions Engineer. Come join us! These positions are remote.
Click this link for more info. lnkd.in/dzKkMNh2
hashtag#hiring hashtag#NowHiring hashtag#WeAreHiring
12.01.2026 16:07 β π 1 π 0 π¬ 0 π 0
Graylog Resource Library
Explore the Graylog Resource Library for a comprehensive collection of videos, case studies, datasheets, eBooks, and whitepapers.
600+ micro-services.
10x faster log processing.
Latency cut from 30 seconds to under 3.
Kaizen Gaming uses Graylog Enterprise to keep Betano visible, stable, and responsive even during peak global events.
#logmanagement #observability
graylog.org/resources/ho...
08.01.2026 16:35 β π 3 π 1 π¬ 0 π 0
Why AI Transformations in Security Fail Like New Yearβs Gym Resolutions
Why enterprise AI in security is shifting from fast adoption to explainable, governed systems that SOC teams can trust, audit, and operate safely.
Gyms fill in January, empty in February. Security AI mirrors it: fast launches, big promisesβthen analysts validate outputs. Skip explainability, governance, and context, and AI stalls. Seth Goldhammer @socalledseth.com : graylog.org/post/why-ai-...
07.01.2026 18:28 β π 1 π 1 π¬ 0 π 0
Cloud vs On-Premised SIEM: One or the Other or Both?
By understanding the key differences between Cloud and On-Premises SIEM solutions, organizations can choose what aligns best with their needs.
On-prem or cloud? Choosing a SIEM deployment isnβt just about technology. Itβs about control, compliance, scale, and operational reality. Learn how to match your SIEM deployment model to your environment, whether thatβs on-prem, cloud, or hybrid. #siem #logmanagement
graylog.org/post/cloud-v...
05.01.2026 17:52 β π 3 π 2 π¬ 0 π 0
Ransomware responders plead guilty to using ALPHV in attacks on US organizations
Two Americans who worked for incident response firms face up to 20 years in prison for turning ransomware upon U.S. businesses.
Cyber incident responders from DigitalMint and Sygnia plead guilty and are facing 20 years in prison for launching ALPHV/Black Cat ransomware attacks themselves.
The two separately tried to flee to Europe before being arrested
therecord.media/ransomware-r...
31.12.2025 16:22 β π 2 π 3 π¬ 0 π 0
6 Steps for Using a SIEM to Detect Threats
Discover best practices on how to use SIEM tools to detect threats and prioritize high-value alerts for faster response.
Are you using your #SIEM to detect #security threats in the most efficient & effective ways possibleβπ€ Doing so will help you strengthen your security posture & better align strategically with business objectives.
Here are 6 steps to help you get there.π graylog.org/post/6-steps... #CyberSecurity
31.12.2025 18:55 β π 0 π 0 π¬ 0 π 0
Supervised AI Is the Fastest Path to Better Threat Triage ROI
Supervised AI boosts ROI by prioritizing alerts from analyst decisions, reducing noise, accelerating triage, and scaling human judgment.
Should you use supervised #AI in your SOC? π€π Yes! When applied to 1st-pass alert triage, it strengthens the human decision layer rather than removing it. ππͺ It helps by prioritizing #security alerts based on how similar events were previously validated by analysts. More: graylog.org/post/supervi...
30.12.2025 23:56 β π 0 π 0 π¬ 0 π 0
Sigma Specification 2.0: What You Need to Know
Sigma Specification 2.0 adds new metadata fields, modifiers, rule correlations, and filters to help reduce alert fatigue for security teams.
βοΈWinter break is the perfect time to brush up on your #Sigmarules! With v2.0 rules you can create vendor-agnostic detections without being limited by proprietary log formats.
Learn about the key changes & supporting Sigma v2.0 mapped to MITRE ATT&CK framework. graylog.org/post/sigma-s... #CyberSec
30.12.2025 01:01 β π 0 π 0 π¬ 0 π 0
25 Linux Logs to Collect and Monitor
Knowing what Linux logs to collect and monitor can help you correlate event information for improved operations and security insights.
IT increasingly runs on Linux. And, as more & more of your dev & IT environments rely on #Linux, focusing your collection & monitoring efforts on these top 25 logs will help you investigate performance issues & #security incidents faster.π
graylog.org/post/25-linu... #OpenSource #SecurityOperations
26.12.2025 20:29 β π 6 π 1 π¬ 0 π 0
25 Linux Logs to Collect and Monitor
Knowing what Linux logs to collect and monitor can help you correlate event information for improved operations and security insights.
IT increasingly runs on Linux. And, as more & more of your dev & IT environments rely on #Linux, focusing your collection & monitoring efforts on these top 25 logs will help you investigate performance issues & #security incidents faster.π
graylog.org/post/25-linu...
#OpenSource #SecurityOperations
24.12.2025 02:54 β π 7 π 3 π¬ 0 π 0
IoT Sensor Data into Graylog: A Lab Guide
Here's a howto for an IoT Sensor and sending data into Graylog. Attached is a DIY Lab Guide With an ESP32 Board for your next lab project.
Got some extra time on your hands this week? This is the perfect thing for you.π«΅
See how you can create a lightweight #API endpoint on the ESP32, poll ot regularly using #Graylogβs HTTP API input, and visualize the results in a live dashboard.ππ
graylog.org/post/iot-sen... #HomeLab #CyberSecurity
23.12.2025 03:16 β π 3 π 1 π¬ 0 π 0
2025 Security Trends That Defined the SOC and What 2026 Will Demand
2025 showed security teams slowed by data overload, process, and unguided AI. Learn the 2026 trends shaping smarter, governed SOC operations.
Curious what the top 2025 SOC trends were? Take a look.ππ
π€ #AI outpaced oversight
π Dashboards expanded while context thinned
β
Cloud costs quietly dictated #cybersecurity decisions
And there are more! See all of the top trends plus our prediction for the SOC in 2026.
graylog.org/post/2025-se...
20.12.2025 17:49 β π 1 π 0 π¬ 0 π 0
Understanding Ransomware Email Threats
Ransomware email threats continue to evolve, making it more difficult for security teams to detect and respond to them effectively. By understanding how they work and why they are successful, security...
There's a new look to #ransomware attacks (no) thanks to the #RaaS ecosystem. As attacks are more automated, identifying & mitigating them becomes more challenging. But, implementing email security, centralizing #security data, integrating #threatintel, & moreβcan help.
graylog.org/post/underst...
18.12.2025 19:19 β π 1 π 0 π¬ 0 π 0
BSides312 - Chicago's Hacking Conference
BSides312 is Chicago's biggest little non-profit hacking & information security conference.
Donβt miss out! π¨ Our Early Bird discount is still live.
Save 20% with code BS312-EB20 and join us at #BSides312 on May 16, 2026.
See you there! π
bsides312.org for more information.
#BSides
17.12.2025 17:00 β π 3 π 2 π¬ 0 π 1
Wondering how #DevOps, development, & AI-powered #dev tools will impact the industry in 2026? Experts offer thoughtful, insightful, & even some controversial predictions in this DevOps Digest article. Hear from industry luminaries on the topic of AI-powered SDLC. www.devopsdigest.com/2026-devops-...
18.12.2025 00:58 β π 1 π 0 π¬ 0 π 0
Understanding the Department of Justice (DOJ) Data Security Program
The DOJ Data Security Program seeks to define controls for mitigating risks arising from data sharing to protect government and bulk US data from being shared with foreign adversaries.
Got questions about the DOJ's new #DataSecurity Program (DSP)? Do your current compliance programs need more controls to comply? Learn what's required of you.π
It's possible to streamline your compliance processes while improving your overall #security posture. See how.
graylog.org/post/underst...
16.12.2025 22:26 β π 2 π 1 π¬ 0 π 0
How to Use MCP to Optimize Your Graylog Security Detections
Use Model Context Protocol (MCP) with Graylog to turn threat intelligence into prioritized, actionable security detections in seconds.
Is your #finserv institution as safe as it could be from #ransomware & other #cyberthreats? Groups like #FIN7, #LazarusGroup & #Carbanak often target #banks with attacks like SWIFT compromises. π¦
But have no fear, #Graylog + Model Context Protocol are here to help! π¦Έ πͺ
graylog.org/post/how-to-...
15.12.2025 23:30 β π 1 π 0 π¬ 0 π 1
From PakisDanπ΅π°π©π° In Denmark for 47+ years. Talk Danish & World Affairs/Aviation/Tech/Travel/Books. Skeets n Skeeps are both English/Urdu and Danish. Well-mannered humor.β₯οΈππ
Extract data, scrape HTML, capture screenshots and follow links with powerful APIs tailored to your business needs.
Website: opengraph.tools
Engineer turned programmer. I try to make useful applications, such as Iceberg Accounting Suite, a Python project that gives users a set of books and basic invoicing. Check out my projects, you may find something helpful
Infrastructure Automation and Network Security Engineer for AI Systems, full bio: https://StewAlexander.com/bio
Born in NYC, live in Boston work in the IT field. Moon light as a sound guy on micro budget films as well as music productions. Def not a supporter of trump.
And don't reply to messages asking for money or looking for anything other than good convo.
The Leading Source for Cybersecurity Insurance News, Insights and Data
CyberInsuranceNews.org
Father, Mountain biker, Blue Teamer
Just a man flesh and bone.
Cybersecurity/ICS/OT/IT/IoT/Engineering/SmartGrid
Innovation/Sustainability/Climate/Recycle/GreenTech
Data/Research/Investing/FreeThinking/
Democracy/Politics/Liberal/Organizer/
Music/Theater/Art/Museums/Food/Languages
Cybersecurity Enthusiast | Red Teamer Wannabe | Open Source Dev Trynabe | Part-Time Student | Full-Time Play Pretend | CEO of HTMX
pragmatic, progressive, multidisciplinary creative, data scientist & full stack dev. occasional avid beach goer. always learning.
π https://marko.tech π https://startyparty.dev
π₯ Blog by Dariusz Majgier. AI, fun facts, science & brilliant ideas:
π https://patreon.com/go4know
π₯ Get prompts, art styles & tutorials. Learn how to create ChatGPT & Midjourney images!
π Join me: https://patreon.com/ai_art_tutorials
info sec, linux, houston, sci-fi (star trek), assorted geekery. progressive leftie. opinions are my own, i grew them myself.
Engineering Leadership words @ https://codegazerants.com
UAS, UAV, drones, RF, wifi, bt, cellular, mobile ... tango after dark
Information security conference in San Francisco, CA