Understanding the ENS Framework: A Guide to Spainβs National Security Framework
Learn how the ENS Framework protects Spainβs public sector systems and how centralized log management supports monitoring and ENS compliance.
What is the ENS Framework?
Spainβs Esquema Nacional de Seguridad defines cybersecurity requirements for public sector systems and vendors.
Learn who it applies to and how centralized log management supports ENS compliance.
Read more:
graylog.org/post/underst...
#Cybersecurity #ENS #Compliance
06.03.2026 16:49
π 1
π 1
π¬ 0
π 0
Centralizing Docker Logs for Observability and Security
There's a lot of graylog documentation, etc around the topic so this should be a good opportunity to pull those into a blog post
Learn what Docker logs capture, their limitations, and best practices for centralizing and analyzing them for better observability and security.
Read the blog:
graylog.org/post/central...
#Docker #DevOps #Observability
04.03.2026 21:54
π 2
π 0
π¬ 0
π 0
Your Data is Whispering and Needs a Human to Listen
Design dashboards that answer real questions. Learn which charts to use, how to structure axes, and how to turn logs into insight.
Most dashboards technically work.
Fewer actually inform.
The key? Let the question choose the chart.
When the right visualization meets the right question, the answer should appear instantly.
Thatβs when message data stops being noise and becomes insight.
New post: graylog.org/post/your-da...
27.02.2026 13:35
π 2
π 0
π¬ 0
π 0
Logs & Lattes Episode 5: Top 10 Cybersecurity Threats Hybrid Teams Actually Face in 2026
YouTube video by Graylog
Lean security teams donβt lose to threats first. They lose to time. Logs & Lattes Ep. 5 covers the top 10 threats hybrid orgs face in 2026 and why triage slows when evidence is scattered across email, identity, VPN, cloud, endpoints, and network tools.
youtu.be/Wobkafs-Ca8
25.02.2026 16:56
π 3
π 1
π¬ 0
π 0
What is OpenTelemetry and Why Do Organizations Use it?
Explore how OpenTelemetry standardizes logs, metrics, and traces, the key security use cases it enables, and how Graylog provides the scalable, affordable backend needed for unified observability.
OpenTelemetry is observability sanity.
Telemetry multiplies, schemas drift, costs climbβ¦ and root cause turns into βfind the right format.β
Add guardrails (retention, context, sampling) and correlation stops being a craft project.
graylog.org/post/what-is...
#OpenTelemetry #SRE
19.02.2026 15:42
π 1
π 0
π¬ 0
π 0
What is the Model Context Protocol (MCP)
Interested in understanding Model Context Protocol? This concise overview explains MCP's role in optimizing data interactions and evaluating SIEM deployments.
MCP is what makes βAI in the SOCβ usable.
Not the model. The integration layer. Standard connections to tools and data with controls that security teams can live with.
Breakdown: graylog.org/post/what-is...
#MCP #SecurityEngineering
17.02.2026 15:38
π 1
π 0
π¬ 0
π 0
Detecting Notepad++ CVE-2025-49144 Using Sysmon Logs
How to detect CVE-2025-49144, a local privilege escalation vulnerability, using Sysmon logs with Graylog searches and Sigma Rules.
CVE-2025-49144 is a local privilege escalation in the Notepad++ installer that abuses how regsvr32.exe is called during setup.
We break down:
β’ what it looks like on real systems
β’ why Sysmon catches it cleanly
β’ a high-signal Graylog search + Sigma rule
graylog.org/post/detecti...
12.02.2026 15:59
π 7
π 3
π¬ 0
π 1
The Human-AI Alliance in Security Operations
AI in security operations reduces context switching in SOC investigations, supports analyst judgment, and keeps workflows fast, and human-led.
Security teams buy βone more toolβ to reduce toil.
Then investigations turn into nine tabs and a Slack thread.
As @socalledseth.com puts it: AI only pays off when it reduces steps inside the analystβs flow β not when it becomes tab #10.
Read the blog:
graylog.org/post/the-hum...
11.02.2026 14:08
π 1
π 1
π¬ 0
π 0
Anomaly Detection with Machine Learning to Improve Security
Learn how machine-learningβdriven anomaly detection enhances security and performance by identifying behavioral deviations in real time. Explore how enriched logs, behavioral baselines, and automated ...
Security today is βWhereβs Waldoβ at terabyte scale.
ML-powered anomaly detection helps teams spot the behaviors that donβt fit the norm, from zero-days to insider threats without drowning in alerts.
Click here: graylog.org/post/anomaly...
#CyberSecurity #MachineLearning #Graylog
04.02.2026 14:57
π 1
π 0
π¬ 0
π 0
Observability vs Monitoring: Getting a Full Picture of the Environment
Gain insights into observability and monitoring, two key concepts in maintaining system health. Explore their roles and how they complement each other.
Monitoring detects issues β observability helps you understand why they happen.
In modern distributed systems, you need both.
New blog: Monitoring vs. Observability + the pillars of telemetry (logs, metrics, traces).
π graylog.org/post/observa...
#Observability #DevOps #Graylog
02.02.2026 16:40
π 2
π 0
π¬ 0
π 0
Compliance Readiness with Audit Logging
Strengthen compliance readiness with centralized audit logging, real-time analytics, and automated reporting powered by parsed, normalized, and correlated data.
Audit logs arenβt just βlogsβ. Theyβre proof.
Who acted? What changed? When? Where?
Discover audit logging basics, log types, compliance use cases, and best practices for security.
π graylog.org/post/complia...
#CyberSecurity #Compliance #AuditLogging
29.01.2026 19:31
π 2
π 0
π¬ 0
π 0
From Atlassian JSON to Actionable Audit Insights
Turn raw Atlassian audit JSON into stable, searchable events. Learn why edge modeling beats pipelines for faster triage, better alerts, and dashboards.
Atlassian audit logs arenβt useless. Theyβre shaped wrong.
Nested JSON and shifting arrays turn simple questions into manual work. Dashboards break. The fix isnβt more parsing in the SIEM. Itβs modeling audit data at the edge.
graylog.org/post/from-at...
#SecurityOperations #SIEM #AuditLogs
28.01.2026 18:55
π 1
π 0
π¬ 0
π 0
Kubernetes Logging Best Practices
Enhance your Kubernetes logging skills with these best practices. Ensure efficient log management for improved performance and error tracking.
Kubernetes without good logging is just mystery pings.
This post breaks down:
β’ How Kubernetes logging works
β’ The key log types every cluster generates
β’ Practical best practices for centralization & retention
π graylog.org/post/kuberne...
#Kubernetes #Observability #DevOps #CloudNative #Security
27.01.2026 16:16
π 3
π 1
π¬ 0
π 0
How to Ignore Cybersecurity AI Bubble FOMO
AI FOMO is hitting the SOC. Prepare security operations for an AI bubble correction with execution discipline, clarity, and workflows.
AI pressure is already hitting the SOC.
Boards want ROI. Teams inherit risk.
The issue isnβt AIβitβs tools that add noise, unchecked automation, and zero proof of impact.
7 bubble-proof moves to invest in AI you can defend.
Read more: graylog.org/post/how-to-...
#securityAI #SOC #ExplainableAI
22.01.2026 18:45
π 1
π 0
π¬ 0
π 0
Introducing The First Graylog Helm Chart Beta V1.0.0
Graylog introduces its first supported Helm chart for Kubernetes, available now as a Beta through Graylog Labs.
Weβve released the first-ever Graylog Helm Chart for Kubernetes β now available in beta.
Graylog in K8s using standard Helm workflows, without hiding the important knobs. No duct-taped manifests. No surprises.
graylog.org/post/introdu...
#Kubernetes #graylog
20.01.2026 19:53
π 3
π 1
π¬ 0
π 0
SIEM Automation to Improve Threat Detection and Incident Response
SIEM automation uses AI, ML, and playbooks to streamline threat detection, investigation, and response with enriched, context-driven alerts.
If your SIEM automation still leaves analysts buried in alerts, itβs not helping. Itβs just louder.
Good automation cuts noise, adds context, and speeds response.
What actually works (and what doesnβt):
π graylog.org/post/siem-au...
14.01.2026 19:29
π 2
π 1
π¬ 0
π 0
Using LLMs, CVSS, and SIEM Data for Runtime Risk Prioritization
Why LLM-only CVSS scoring fails without SIEM context, and how log-driven AI enables runtime risk prioritization across APIs and infrastructure IT.
Runtime risk isnβt harder to analyze. Itβs easier to misread. A UNC Wilmington study of 31k+ vulns shows LLMs can infer CVSS but fail without runtime context.
The same applies to MITRE mappings. Seth Goldhammer explains why AI needs SIEM data.
graylog.org/post/using-l...
#cybersecurity #SIEM #AI
13.01.2026 19:40
π 0
π 0
π¬ 0
π 0
Graylog is hiring in the USA!! We are looking for a Director of Revenue Operations and a Solutions Engineer. Come join us! These positions are remote.
Click this link for more info. lnkd.in/dzKkMNh2
hashtag#hiring hashtag#NowHiring hashtag#WeAreHiring
12.01.2026 16:07
π 1
π 0
π¬ 0
π 0
Graylog Resource Library
Explore the Graylog Resource Library for a comprehensive collection of videos, case studies, datasheets, eBooks, and whitepapers.
600+ micro-services.
10x faster log processing.
Latency cut from 30 seconds to under 3.
Kaizen Gaming uses Graylog Enterprise to keep Betano visible, stable, and responsive even during peak global events.
#logmanagement #observability
graylog.org/resources/ho...
08.01.2026 16:35
π 3
π 1
π¬ 0
π 0
Why AI Transformations in Security Fail Like New Yearβs Gym Resolutions
Why enterprise AI in security is shifting from fast adoption to explainable, governed systems that SOC teams can trust, audit, and operate safely.
Gyms fill in January, empty in February. Security AI mirrors it: fast launches, big promisesβthen analysts validate outputs. Skip explainability, governance, and context, and AI stalls. Seth Goldhammer @socalledseth.com : graylog.org/post/why-ai-...
07.01.2026 18:28
π 1
π 1
π¬ 0
π 0
Cloud vs On-Premised SIEM: One or the Other or Both?
By understanding the key differences between Cloud and On-Premises SIEM solutions, organizations can choose what aligns best with their needs.
On-prem or cloud? Choosing a SIEM deployment isnβt just about technology. Itβs about control, compliance, scale, and operational reality. Learn how to match your SIEM deployment model to your environment, whether thatβs on-prem, cloud, or hybrid. #siem #logmanagement
graylog.org/post/cloud-v...
05.01.2026 17:52
π 3
π 2
π¬ 0
π 0
Ransomware responders plead guilty to using ALPHV in attacks on US organizations
Two Americans who worked for incident response firms face up to 20 years in prison for turning ransomware upon U.S. businesses.
Cyber incident responders from DigitalMint and Sygnia plead guilty and are facing 20 years in prison for launching ALPHV/Black Cat ransomware attacks themselves.
The two separately tried to flee to Europe before being arrested
therecord.media/ransomware-r...
31.12.2025 16:22
π 2
π 3
π¬ 0
π 0
6 Steps for Using a SIEM to Detect Threats
Discover best practices on how to use SIEM tools to detect threats and prioritize high-value alerts for faster response.
Are you using your #SIEM to detect #security threats in the most efficient & effective ways possibleβπ€ Doing so will help you strengthen your security posture & better align strategically with business objectives.
Here are 6 steps to help you get there.π graylog.org/post/6-steps... #CyberSecurity
31.12.2025 18:55
π 0
π 0
π¬ 0
π 0
Supervised AI Is the Fastest Path to Better Threat Triage ROI
Supervised AI boosts ROI by prioritizing alerts from analyst decisions, reducing noise, accelerating triage, and scaling human judgment.
Should you use supervised #AI in your SOC? π€π Yes! When applied to 1st-pass alert triage, it strengthens the human decision layer rather than removing it. ππͺ It helps by prioritizing #security alerts based on how similar events were previously validated by analysts. More: graylog.org/post/supervi...
30.12.2025 23:56
π 0
π 0
π¬ 0
π 0
Sigma Specification 2.0: What You Need to Know
Sigma Specification 2.0 adds new metadata fields, modifiers, rule correlations, and filters to help reduce alert fatigue for security teams.
βοΈWinter break is the perfect time to brush up on your #Sigmarules! With v2.0 rules you can create vendor-agnostic detections without being limited by proprietary log formats.
Learn about the key changes & supporting Sigma v2.0 mapped to MITRE ATT&CK framework. graylog.org/post/sigma-s... #CyberSec
30.12.2025 01:01
π 0
π 0
π¬ 0
π 0
25 Linux Logs to Collect and Monitor
Knowing what Linux logs to collect and monitor can help you correlate event information for improved operations and security insights.
IT increasingly runs on Linux. And, as more & more of your dev & IT environments rely on #Linux, focusing your collection & monitoring efforts on these top 25 logs will help you investigate performance issues & #security incidents faster.π
graylog.org/post/25-linu... #OpenSource #SecurityOperations
26.12.2025 20:29
π 6
π 1
π¬ 0
π 0
25 Linux Logs to Collect and Monitor
Knowing what Linux logs to collect and monitor can help you correlate event information for improved operations and security insights.
IT increasingly runs on Linux. And, as more & more of your dev & IT environments rely on #Linux, focusing your collection & monitoring efforts on these top 25 logs will help you investigate performance issues & #security incidents faster.π
graylog.org/post/25-linu...
#OpenSource #SecurityOperations
24.12.2025 02:54
π 7
π 3
π¬ 0
π 0
IoT Sensor Data into Graylog: A Lab Guide
Here's a howto for an IoT Sensor and sending data into Graylog. Attached is a DIY Lab Guide With an ESP32 Board for your next lab project.
Got some extra time on your hands this week? This is the perfect thing for you.π«΅
See how you can create a lightweight #API endpoint on the ESP32, poll ot regularly using #Graylogβs HTTP API input, and visualize the results in a live dashboard.ππ
graylog.org/post/iot-sen... #HomeLab #CyberSecurity
23.12.2025 03:16
π 3
π 1
π¬ 0
π 0