Graylog Webinars
Join us for a 30-minute walkthrough of the Graylog 7.0 Fall โ25 Release, built to make every analyst faster and every decision clearer. Learn about explainable AI, guided investigation workflows, and ...
Graylog 7.0 is here & it's hot. ๐ฅ It's got:
๐คExplainable AI
โก๏ธGuided investigation workflows
๐Smarter dashboards that turn noise into action
Join us Nov. 12 & learn all about this releaseโAI dashboard summarization, event procedures & guided remediation, & more! graylog.org/webinar/ #CyberSecurity
04.11.2025 21:33 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0
Gobbling Up Insights: Graylog 7.0 Serves Up a Feast
Graylog 7.0 delivers smarter dashboards, guided remediation, AI insights, and cloud cost control for faster, clearer security operations.
Introducing #Graylog 7.0!๐ Take a look at the improvements across dashboards, automation, & #AI support. There are 4 key ingredients in this 7.0 #Thanksgiving feast:
๐กSmarter Dashboards
๐ ๏ธGuided Remediation
๐ฒCost-efficient Data Lake Integration
๐คNative MCP Support
graylog.org/post/gobblin... #SIEM
03.11.2025 18:41 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0
Are You Protecting the Right People in Your Organization?
Are You Protecting the Right People in Your Organization? Attackers follow access, not titles. Identify your Very Attacked People (VAPs).
๐ #HappyHalloween! Let's talk about how SCARY๐ป it is when attackers target your riskiest users, like those who:
๐Approve 3rd-party contracts
๐ฒHave access to payroll
๐Manage badge entry systems
It's more effective to account for who is being attacked, not just how. graylog.org/post/are-you... #SIEM
31.10.2025 20:57 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0
With SIEMs, ingest-based/resource-heavy licensing models lead to tradeoffsโdropping logs, tuning down detections, & moreโto avoid budget overages.๐ธ See how flexible data routing can allow you to prioritize what matters, while retaining the rest in a standby data lake. www.youtube.com/watch?v=c7he...
30.10.2025 22:11 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
Sliding Through Log-Time Space
This post kicks off a new series written by the Graylog Development Team. In these updates, weโll highlight the features and fixes that make daily work in Graylog smoother. We want to show the work we...
Next up for #GraylogLabs! We have a minor but functional enhancement to highlight for youโGraylog time-range stepping. To fix manual time-range adjustment limitations there are now 2 new time range nav buttons for stepping forward & backward through logs. โฌ
๏ธ โก๏ธ Learn more: graylog.org/post/sliding...
29.10.2025 19:34 โ ๐ 3 ๐ 1 ๐ฌ 0 ๐ 0
CISA warns of two more actively exploited Dassault vulnerabilities
The Cybersecurity & Infrastructure Security Agency (CISA) warned today that attackers are actively exploiting two vulnerabilities in Dassault Systรจmes' DELMIA Apriso, a manufacturing operations management (MOM) and execution (MES) solution. [...]
CISA warns of two more actively exploited Dassault vulnerabilities
The Cybersecurity & Infrastructure Security Agency (CISA) warned today that attackers are actively exploiting two vulnerabilities in Dassault Systรจmes' DELMIA Apriso, a manufacturing operations management (MOM) anโฆ
#hackernews #news
29.10.2025 18:44 โ ๐ 0 ๐ 1 ๐ฌ 0 ๐ 0
Graylog Resource Library
Explore the Graylog Resource Library for a comprehensive collection of videos, case studies, datasheets, eBooks, and whitepapers.
Learn how you can get fast detection, predictable costs, & analyst-friendly workflowsโw/o the compromises that hold legacy #SIEM platforms back. Learn about flat, transparent pricing, license-free data lake storage, & flexible deployment options that run natively on #AWS! graylog.org/resources/gr...
28.10.2025 21:22 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
๐ Welcome to Episode 3 of Logs & Lattes! ๐ชตโ Recently, both GigaOm & #Gartner Magic Quadrant recognized Graylog. ๐
๐บ Watch & learn what this dual recognition means for customers, analysts, & the future of #security operations.
www.youtube.com/watch?v=EVIj... #CyberSecurity #InfoSec #SIEM
27.10.2025 22:58 โ ๐ 1 ๐ 1 ๐ฌ 0 ๐ 0
Wir beseitigen die traditionellen Kompromisse, die SIEM-Plattformen plagen!
Im Interview spricht Andy Grolnick, CEO vom SIEM-Sicherheitsanbieter Graylog, รผber den Mangel an Security-Spezialisten, welche Funktionen SIEM-Plattformen zwin
โ ๏ธTraditional SIEMs come with trade-offs as well as #security risks that can compound over time. Your #SIEM should grow with your needs (not constrain them), provide frictionless workflows, & help analysts stay ahead of threats. Does your SIEM check all of these boxes?๐คโ
ap-verlag.de/wir-beseitig...
24.10.2025 22:00 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
๐ค BSidesSF 2026 Call for Participation is OPEN until October 28th, 2025!
More info: ๐ bsidessf.org/cfp
#cybersecurity #infosec #SIEM #BSides #BSidesSF
24.10.2025 18:49 โ ๐ 4 ๐ 0 ๐ฌ 0 ๐ 0
Building SOC Operational Clarity: A Leadership Imperative for CISOs
AI is evolving at a rapid pace, and the uptake of Generative AI (GenAI) is revolutionising the way humans interact and leverage this technology. GenAI is
#CISOs must lead in many directionsโupward to execs, downward to analysts & laterally to peers.โฌ๏ธโฌ๏ธโ๏ธ๐ฌ Alignment & communication are critical to maintaining effectiveness for #security teams & CISOs need to make it happen. Here's some great advice to help. www.cybersecurity-insiders.com/building-soc...
22.10.2025 20:35 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0
Overcoming Cybersecurity and Risk Management Challenges
Organizations with robust cybersecurity and risk management programs can reduce the likelihood and impact of security and privacy incidents.
#Cybersecurity & #riskmanagement are challenging. As more & more applications that share data are connected to the internet, the # of potential attack points increases. Learn about best practices for mitigating risk while also providing assurance about #security posture.
graylog.org/post/overcom...
21.10.2025 20:27 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
bsides.london
#Security #BSides #London #BSidesLDN2025
20.10.2025 08:55 โ ๐ 8 ๐ 4 ๐ฌ 0 ๐ 0
How Graylog Uses Explainable AI to Help Security Teams
Graylog AI empowers analysts with transparency and context. No black boxes. Smarter, faster SOCs built on explainable intelligence.
AI-assisted workflows are on the rise, & when an algorithm highlights a critical #security event you need to understand why. Without visibility, this #AI assistance risks creating new blind spots & hiding important context.๐ Learn about the #AI capabilities that can help: graylog.org/post/how-gra...
20.10.2025 21:39 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0
Meet great people! Hear informative talks!
Network with cybersecurity professionals! Work with the pros!
Sign up to volunteer for #BSidesDelaware2025 at https://bsidesdelaware.com/volunteers/
#BSD2025 #BSidesDelaware #BSidesDE #volunteers
20.10.2025 20:11 โ ๐ 2 ๐ 2 ๐ฌ 0 ๐ 0
HIPAA Compliance Challenges for Small Medical Practices
All healthcare providers are required to comply with the HIPAA Rules, but there are unique challenges for small medical practices. Large healthcare Small medical practices face unique challenges withโฆ
While hackers and ransomware groups have historically focused their efforts on attacking larger healthcare organizations with deeper pockets, smaller healthcare practices are increasingly being targeted for the simple reason that they are easier to attack, as they have fewer resources.
20.10.2025 20:51 โ ๐ 0 ๐ 1 ๐ฌ 0 ๐ 0
Time for Episode 2 of Logs & Lattes!๐ชตโ Go from noise to actionโ& get smarter #securityops that reduce risk.โฌ๏ธโ ๏ธ
From #alertfatigue to risk-1st response... let's unpack practical ways you can prioritize real threats, automate w/ context, & more. Ready? Let's dive in.
๐บ youtu.be/a40J3rSs_PI #security
18.10.2025 01:54 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0
From Tool Sprawl to One Platform: How Graylog Simplifies Security Visibility
Break free from tool sprawl. Graylog unifies visibility, detection, and response so security teams cut costs, complexity, and blind spots.
#Security leaders use an average of 19 different tools, & 80% say this complexity creates blind spots + drains budgets.๐๐ธ
Learn how a single, integrated platform can improve your detection, response, & retention while also helping the economics of your #secops.๐ graylog.org/post/from-to... #CISOs
16.10.2025 20:20 โ ๐ 4 ๐ 1 ๐ฌ 0 ๐ 0
Graylog recognized in the 2025 Gartnerยฎ Magic Quadrantโข for SIEM.
Learn more โ graylog.com/gartner-mq-2... #SIEM #cybersecurity #infosec
15.10.2025 17:31 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
How campaign-centric detection can address alert fatigue
CISOs and their teams are constantly monitoring their tech estates to detect potential cyberattacks but, even so, attacks can be missed or detection delayed. One of the major causes of organizationsโ ...
#Alertfatigue is now responsible for more than half of all #cybersecurity breaches! ๐ด๐ฑ But, don't fret. Campaign-centric detection can help! ๐
๐ก Learn all about campaign-centric detection, in this article by Graylog's Ross Brewer. ๐
resilienceforward.com/how-campaign... #infosec #SIEM #Graylog
14.10.2025 23:31 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 1
SIEM is not dead!๐ซ๐ต It's just misunderstood.๐
Watch & learn about:
๐กThe concept of #SIEM
๐SIEM implementation issues
๐คHow #AI can make SIEM smarter
๐ก๏ธHow to combat complexity & false positives
โ ๏ธRisk management & automation
๐How to optimize a SIEM
โMore
graylog.org/post/siems-n... #cybersecurity
10.10.2025 19:49 โ ๐ 4 ๐ 0 ๐ฌ 0 ๐ 0
How Graylog Helps You Spot LockBit-Style Attacks Sooner
LockBit Attack insights: Graylog flags credential reuse, correlates RDP/PowerShell, and stops ransomware before domain-wide encryption.
A #LockBit attack w/ #ransomware intrusion succeeded w/o advanced exploits or zero-day vulnerabilities, showing how common techniques can escalate into bad outcomes. See how to spot early signals & correlate activity into something actionable before ransomware takes hold. graylog.org/post/how-gra...
10.10.2025 03:31 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Security Journal UK
Security Journal UK - Security Journal UK - Issue 57/October 2025
Even big brands are at risk for #cyberattacks โ including some major retailers in 2025. So, how can brands stay protected? Read about the 6 pillars of identity, visibility, containment, application monitoring, patching, & culture. digital.securityjournaluk.com/html5/reader... #cybersecurity #infosec
09.10.2025 01:25 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Hello Europe! ๐ Are you at #itsaexpo? If so, you have two more days to connect with Grayloggers there who are excited to talk with you about #SIEM, #APISecurity, & #logmanagement that is purpose-built for #security teams.
Find them in Hall 7, booth 441! www.itsa365.de/en/it-sa-exp... #cybersecurity
08.10.2025 03:23 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
Graylog Academy: Free On-Demand Training Available
Go to the Graylog Academy and sign up for on demand free training. Learn the analyst fundamentals of Graylog!
Have you taken advantage of our FREE analyst training, yet? The #Graylog Academy is here for you.๐ซต
This on-demand training covers many topics โ ensures participants gain a deep understanding of the platform & its capabilities.๐
Pass a test = get a certificate!๐ More โคต๏ธ graylog.org/post/graylog...
07.10.2025 03:28 โ ๐ 3 ๐ 1 ๐ฌ 0 ๐ 0
Drum roll please!๐ฅ๐ฅ๐ฅ Introducing the new #LogsandLattes podcast.๐ฅ๐๏ธ In this 1st episode we talk about the hidden cost of traditional #SIEM pricing.โ ๐ต ๐ค
How much value are we really getting from our logs, & what are we giving up to stay on budget? Watch now!๐
๐บ graylog.info/4nYBUE7 #cybersecurity
03.10.2025 23:10 โ ๐ 4 ๐ 2 ๐ฌ 0 ๐ 1
Security Pipelines Are Broken. Hereโs How to Fix Them
Turn noisy telemetry pipelines into real signals. Graylog cuts noise, enriches data, and prioritizes risk so teams detect faster.
Are telemetry pipelines flooding you with noise instead of insight? ๐๐ฆ More data does not mean better detection!
Learn how you can have a better pipeline strategy where detection starts at the data layer with inline enrichment, real-time correlation, & more. graylog.org/post/securit... #security
02.10.2025 19:25 โ ๐ 1 ๐ 1 ๐ฌ 0 ๐ 0
We're going to #itsaexpo next week! ๐ซ Connect with the #Graylog team there to learn about detection, investigation, & response without compromise. They'll be in Hall 7, booth 441.
See you there Oct. 7 - 9. Who's going? ๐ No ticket yet? Use ticket code ITSEC25we & register now: graylog.info/475DeiT
02.10.2025 02:43 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
๐ฅ Blog by Dariusz Majgier. AI, fun facts, science, brilliant ideas & ways to save money:
๐ https://patreon.com/go4know
๐ฅ Join my Patreon to learn AI art with Midjourney, get prompts, tutorials, and stock images:
๐ https://patreon.com/ai_art_tutorials
Linux, code security, coffee loving technology person/geek. Pentaxian from England, GB. Supporting ๐บ๐ฆ
I used to be on Twitter pre-takeover. Everyone one here seems lovely.
I'm currently learning Go, modern C++ and film..
info sec, linux, houston, sci-fi (star trek), assorted geekery. progressive leftie. opinions are my own, i grew them myself.
Engineering Leadership words @ https://codegazerants.com
UAS, UAV, drones, RF, wifi, bt, cellular, mobile ... tango after dark
Information security conference in San Francisco, CA
Cybersecurity Innovation for AI & Emerging Tech
Board Advisor | Sr. Product Leadership | Innovation
Emerging Tech | AI | Cloud | IoT | Critical Infrastructure
Speaker | Author | Innovator | Patent-Holder
SF Bay Area, USA
Hacker รฉtico fundador de la OIHEC
InfoSec - If email security counts as infosec anymore. Grew up with COBOL and Mainframes. Martial arts, reading, too much TV.
Curious and creative. Ready for the next adventure.
AI Security Engineer @ Amazon.
M.S. Cybersecurity, CISSP.
Ex-NSA, USMC.
I am many things; Music Fanatic, Game Developer, Web Developer, Security Researcher... I like to wear a few hats - Prince George, BC - Canada
https://theblobinc.com https://xavi.app https://princegeorge.cc
https://www.youtube.com/watch?v=HsM_VmN6ytk
Cybersecurity Analyst | BTL1 | Security+ | Google Cert | ๐ผ Available for Hire
Cybersecurity at Pegasystems. Views are my own.
Transmit sensitive information securely:
End-to-end encrypted. Ephemeral. Open source.
Try yourself: https://scrt.link