Every Organization Needs Centralized Logging
Logs are on the systems, why do I need this? Because Digital Forensics & Incident Response is...
Okta + LAPSUS$ Security Incident
As many in the industry are now aware, Okta experienced a form of security breach back in January...
Detecting Threats with Graylog Pipelines - Part 3
Now that we've normalized and enriched our events, let's get into the actual threat detection logic...
Detecting Threats with Graylog Pipelines - Part 2
In my previous post, I explained the fundamental purpose and use cases of pipelines in Graylog –...
Detecting Threats with Graylog Pipelines - Part 1
If you are here hoping to learn more about using Graylog for the purpose of monitoring the security...
