Graylog
banner
graylog.bsky.social
Graylog
@graylog.bsky.social
2.7K followers 1.5K following 490 posts
🌍 Trusted Threat Detection & Incident Response solutions. Experience the difference with our unmatched capabilities. #SIEM #APISecurity #LogManagement #InfoSec
Posts Media Videos Starter Packs
On-tap for today we have—detection chains! 🔎⛓️💥 On your #Graylog Security Events page, there is a new badge for events that are detection chains—or as we call them "attack campaigns".

Wondering what a detection chain looks like in #Graylog? 🤔 Watch & see. 👀👇

www.youtube.com/watch?v=tCM_... #SIEM
Graylog Detection Chains
YouTube video by Graylog
www.youtube.com
Graylog 7.0 is here & it's hot. 🔥 It's got:
🤖Explainable AI
➡️Guided investigation workflows
📊Smarter dashboards that turn noise into action

Join us Nov. 12 & learn all about this release—AI dashboard summarization, event procedures & guided remediation, & more! graylog.org/webinar/ #CyberSecurity
Graylog Webinars
Join us for a 30-minute walkthrough of the Graylog 7.0 Fall ’25 Release, built to make every analyst faster and every decision clearer. Learn about explainable AI, guided investigation workflows, and ...
graylog.org
Introducing #Graylog 7.0!🎊 Take a look at the improvements across dashboards, automation, & #AI support. There are 4 key ingredients in this 7.0 #Thanksgiving feast:

💡Smarter Dashboards
🛠️Guided Remediation
💲Cost-efficient Data Lake Integration
🤝Native MCP Support

graylog.org/post/gobblin... #SIEM
Gobbling Up Insights: Graylog 7.0 Serves Up a Feast
Graylog 7.0 delivers smarter dashboards, guided remediation, AI insights, and cloud cost control for faster, clearer security operations.
graylog.org
🎃 #HappyHalloween! Let's talk about how SCARY👻 it is when attackers target your riskiest users, like those who:

📃Approve 3rd-party contracts
💲Have access to payroll
📛Manage badge entry systems

It's more effective to account for who is being attacked, not just how. graylog.org/post/are-you... #SIEM
Are You Protecting the Right People in Your Organization?
Are You Protecting the Right People in Your Organization? Attackers follow access, not titles. Identify your Very Attacked People (VAPs).
graylog.org
With SIEMs, ingest-based/resource-heavy licensing models lead to tradeoffs—dropping logs, tuning down detections, & more—to avoid budget overages.💸 See how flexible data routing can allow you to prioritize what matters, while retaining the rest in a standby data lake. www.youtube.com/watch?v=c7he...
Next up for #GraylogLabs! We have a minor but functional enhancement to highlight for you—Graylog time-range stepping. To fix manual time-range adjustment limitations there are now 2 new time range nav buttons for stepping forward & backward through logs. ⬅️ ➡️ Learn more: graylog.org/post/sliding...
Sliding Through Log-Time Space
This post kicks off a new series written by the Graylog Development Team. In these updates, we’ll highlight the features and fixes that make daily work in Graylog smoother. We want to show the work we...
graylog.org
Reposted by Graylog
CISA warns of two more actively exploited Dassault vulnerabilities

The Cybersecurity & Infrastructure Security Agency (CISA) warned today that attackers are actively exploiting two vulnerabilities in Dassault Systèmes' DELMIA Apriso, a manufacturing operations management (MOM) an…
#hackernews #news
CISA warns of two more actively exploited Dassault vulnerabilities
The Cybersecurity & Infrastructure Security Agency (CISA) warned today that attackers are actively exploiting two vulnerabilities in Dassault Systèmes' DELMIA Apriso, a manufacturing operations management (MOM) and execution (MES) solution. [...]
www.bleepingcomputer.com
Learn how you can get fast detection, predictable costs, & analyst-friendly workflows—w/o the compromises that hold legacy #SIEM platforms back. Learn about flat, transparent pricing, license-free data lake storage, & flexible deployment options that run natively on #AWS! graylog.org/resources/gr...
Graylog Resource Library
Explore the Graylog Resource Library for a comprehensive collection of videos, case studies, datasheets, eBooks, and whitepapers.
graylog.org
👋 Welcome to Episode 3 of Logs & Lattes! 🪵☕ Recently, both GigaOm & #Gartner Magic Quadrant recognized Graylog. 🌟

📺 Watch & learn what this dual recognition means for customers, analysts, & the future of #security operations.

www.youtube.com/watch?v=EVIj... #CyberSecurity #InfoSec #SIEM
⚠️Traditional SIEMs come with trade-offs as well as #security risks that can compound over time. Your #SIEM should grow with your needs (not constrain them), provide frictionless workflows, & help analysts stay ahead of threats. Does your SIEM check all of these boxes?🤔✅ ap-verlag.de/wir-beseitig...
Wir beseitigen die traditionellen Kompromisse, die SIEM-Plattformen plagen!
Im Interview spricht Andy Grolnick, CEO vom SIEM-Sicherheitsanbieter Graylog, über den Mangel an Security-Spezialisten, welche Funktionen SIEM-Plattformen zwin
ap-verlag.de
🎤 BSidesSF 2026 Call for Participation is OPEN until October 28th, 2025!

More info: 👉 bsidessf.org/cfp

#cybersecurity #infosec #SIEM #BSides #BSidesSF
The Chord Energy #Houston Corporate 5k event happened yesterday and Grayloggers were excited to be a part of it! 🏃‍♂️🏃‍♀️ "Houston's largest office party" is always a great team-building event. 🤝 Thank you for an awesome time Chord Energy! 🥳

www.houstoncorporate5k.com #Graylog #TeamBuilding
#CISOs must lead in many directions—upward to execs, downward to analysts & laterally to peers.⬆️⬇️↔️😬 Alignment & communication are critical to maintaining effectiveness for #security teams & CISOs need to make it happen. Here's some great advice to help. www.cybersecurity-insiders.com/building-soc...
Building SOC Operational Clarity: A Leadership Imperative for CISOs
AI is evolving at a rapid pace, and the uptake of Generative AI (GenAI) is revolutionising the way humans interact and leverage this technology. GenAI is
www.cybersecurity-insiders.com
#Cybersecurity & #riskmanagement are challenging. As more & more applications that share data are connected to the internet, the # of potential attack points increases. Learn about best practices for mitigating risk while also providing assurance about #security posture.

graylog.org/post/overcom...
Overcoming Cybersecurity and Risk Management Challenges
Organizations with robust cybersecurity and risk management programs can reduce the likelihood and impact of security and privacy incidents.
graylog.org
AI-assisted workflows are on the rise, & when an algorithm highlights a critical #security event you need to understand why. Without visibility, this #AI assistance risks creating new blind spots & hiding important context.😓 Learn about the #AI capabilities that can help: graylog.org/post/how-gra...
How Graylog Uses Explainable AI to Help Security Teams
Graylog AI empowers analysts with transparency and context. No black boxes. Smarter, faster SOCs built on explainable intelligence.
graylog.org
Reposted by Graylog
Meet great people! Hear informative talks!

Network with cybersecurity professionals! Work with the pros!

Sign up to volunteer for #BSidesDelaware2025 at https://bsidesdelaware.com/volunteers/

#BSD2025 #BSidesDelaware #BSidesDE #volunteers
Reposted by Graylog
While hackers and ransomware groups have historically focused their efforts on attacking larger healthcare organizations with deeper pockets, smaller healthcare practices are increasingly being targeted for the simple reason that they are easier to attack, as they have fewer resources.
HIPAA Compliance Challenges for Small Medical Practices
All healthcare providers are required to comply with the HIPAA Rules, but there are unique challenges for small medical practices. Large healthcare Small medical practices face unique challenges with…
www.hipaajournal.com
Time for Episode 2 of Logs & Lattes!🪵☕ Go from noise to action—& get smarter #securityops that reduce risk.⬇️⚠️

From #alertfatigue to risk-1st response... let's unpack practical ways you can prioritize real threats, automate w/ context, & more. Ready? Let's dive in.

📺 youtu.be/a40J3rSs_PI #security
#Security leaders use an average of 19 different tools, & 80% say this complexity creates blind spots + drains budgets.🙈💸

Learn how a single, integrated platform can improve your detection, response, & retention while also helping the economics of your #secops.🙌 graylog.org/post/from-to... #CISOs
From Tool Sprawl to One Platform: How Graylog Simplifies Security Visibility
Break free from tool sprawl. Graylog unifies visibility, detection, and response so security teams cut costs, complexity, and blind spots.
graylog.org
Graylog recognized in the 2025 Gartner® Magic Quadrant™ for SIEM.

Learn more → graylog.com/gartner-mq-2... #SIEM #cybersecurity #infosec
SIEM is not dead!🚫😵 It's just misunderstood.😒

Watch & learn about:
💡The concept of #SIEM
😓SIEM implementation issues
🤖How #AI can make SIEM smarter
🛡️How to combat complexity & false positives
⚠️Risk management & automation
👍How to optimize a SIEM
➕More

graylog.org/post/siems-n... #cybersecurity
A #LockBit attack w/ #ransomware intrusion succeeded w/o advanced exploits or zero-day vulnerabilities, showing how common techniques can escalate into bad outcomes. See how to spot early signals & correlate activity into something actionable before ransomware takes hold. graylog.org/post/how-gra...
How Graylog Helps You Spot LockBit-Style Attacks Sooner
LockBit Attack insights: Graylog flags credential reuse, correlates RDP/PowerShell, and stops ransomware before domain-wide encryption.
graylog.org
Even big brands are at risk for #cyberattacks — including some major retailers in 2025. So, how can brands stay protected? Read about the 6 pillars of identity, visibility, containment, application monitoring, patching, & culture. digital.securityjournaluk.com/html5/reader... #cybersecurity #infosec
Security Journal UK
Security Journal UK - Security Journal UK - Issue 57/October 2025
digital.securityjournaluk.com