When AI can chain zero-day exploits without a human in the loop, detection speed matters more than team size.
Some thoughts on what that means for lean security teams and how to get more from the tools already in place.
graylog.org/post/how-lea...
#cybersecurity #infosec
Posts by Graylog
Disasters donât wait. Your recovery plan shouldnât either.
A solid IT disaster recovery plan = less downtime, lower costs, and faster recovery when systems fail.
Learn how to build one that actually works đ
graylog.org/post/how-to-...
#ITOps #DisasterRecovery #Cybersecurity
Building with LLMs? The OWASP Top 10 for LLM Security (2025) is your threat checklist:
Donât ship AI apps without reading this: graylog.org/post/what-is...
#LLMSecurity #OWASP #CyberSecurity #AI
NIS2 sets a 24-hour window to report a significant security incident.
Centralized log management gives you the visibility to detect, investigate, and report on time â no scrambling required.
Full breakdown of CLM for NIS2 compliance: graylog.org/post/clm-for...
#NIS2 #Cybersecurity #Compliance
EU cybersecurity certification (EUCC) is now a reality for ICT vendors. Know your TOE, your Security Target, and your assurance level, and make sure your logging and monitoring can back up your security claims.
graylog.org/post/underst...
#Cybersecurity #EUCC
Logs shouldnât live in silos.
Unified logging creates a single source of truth across your entire environmentâso security, ops, and engineering work from the same data.
Faster investigations. Better visibility. Less overhead.
Read more: graylog.org/post/unified...
AI compliance is becoming essentialânot just for regulations, but for trust.
Learn what it means, key global frameworks, and how to evaluate AI-enabled solutions responsibly.
Human oversight, transparency, and accountability matter.
graylog.org/post/underst...
#AI #Cybersecurity #Compliance
Grateful and humbled. Another RSA in the books, great conversations, and new hardware to show for it.
Thanks to all who stopped by and chatted with us.
#RSAC2026 #Graylog #SIEM #CyberSecurity
Graylog team at RSAC 2026.
Most SIEMs reward complexity. We don't.
Come see us at Booth S-3118 to learn more!
Experience a #SIEM that actually works for lean security teams.
#cybersecurity #RSAC2026
At #RSAC?
Find us at Booth S-3118. @socalledseth.com and the @graylog.bsky.social team are showing how to turn telemetry into real-time threat detection and faster response.
Less noise. Better decisions. Faster outcomes.
Cyber resilience isnât about stopping every attackâitâs about how fast you recover.
Disruption is expected. Downtime doesnât have to be.
Hereâs what resilient organizations do differently đ
graylog.org/post/cyber-r...
Stop by đđ¨đ¨đđĄ đ-đđđđ at #RSAC2026 to see our new hardware in person!
Two awards. One booth. Zero tolerance for SIEM that creates more work than it closes.
Graylog won Hot Company SIEM and Best Solution Central Log Management at #RSAC 2026.
Come see us at Booth S-3118 this week.
Full story: graylog.org/news/graylog...
#RSAC2026 #SIEM #CyberSecurity #LogManagement
Find Graylog at RSA Booth S-3118 (Moscone South, March 23â26) and see how teams are:
â Prioritizing real threatsânot noise
â Closing investigations faster
â Learning how to use explainable AI
If your SIEM is slowing you down⌠we should talk.
#RSAC #RSA #RSAC2026
Australiaâs Essential Eight provides the baseline security practices for reducing cyber risk and strengthening compliance.
Read more: graylog.org/post/the-ess...
#CyberSecurity #EssentialEight #Compliance
SIEMs in 2026 are very expensive noise machines with a billing problem.
The 2026 State of SIEM Report: Top 10 threats ranked. 12-point buying checklist. 12-month roadmap. Built for 1-10 practitioner teams who need decisions, not more tabs to open.
graylog.org/resources/st...
A cyberattack on medical device maker Stryker disrupted systems used by healthcare providers and emergency responders worldwide.
Key lessons: endpoint monitoring, MDM, centralized logs, and visibility.
Read more:
graylog.org/post/the-str...
#CyberSecurity #HealthcareIT #SIEM
Modern IT systems generate millions of log events every day.
Log correlation connects those events across systems to uncover threats, performance issues, and root causes faster.
Learn how correlation engines turn fragmented logs into actionable insights.
graylog.org/post/log-cor...
Their SIEM shouldn't need more care than their patients.
Kennedy Krieger Institute swapped infrastructure headaches for Graylog Cloud and got faster investigations, compliance-ready log retention, and costs that don't spike mid-quarter.
Full story: graylog.org/resources/cu...
What is the ENS Framework?
Spainâs Esquema Nacional de Seguridad defines cybersecurity requirements for public sector systems and vendors.
Learn who it applies to and how centralized log management supports ENS compliance.
Read more:
graylog.org/post/underst...
#Cybersecurity #ENS #Compliance
Learn what Docker logs capture, their limitations, and best practices for centralizing and analyzing them for better observability and security.
Read the blog:
graylog.org/post/central...
#Docker #DevOps #Observability
Most dashboards technically work.
Fewer actually inform.
The key? Let the question choose the chart.
When the right visualization meets the right question, the answer should appear instantly.
Thatâs when message data stops being noise and becomes insight.
New post: graylog.org/post/your-da...
Lean security teams donât lose to threats first. They lose to time. Logs & Lattes Ep. 5 covers the top 10 threats hybrid orgs face in 2026 and why triage slows when evidence is scattered across email, identity, VPN, cloud, endpoints, and network tools.
youtu.be/Wobkafs-Ca8
OpenTelemetry is observability sanity.
Telemetry multiplies, schemas drift, costs climb⌠and root cause turns into âfind the right format.â
Add guardrails (retention, context, sampling) and correlation stops being a craft project.
graylog.org/post/what-is...
#OpenTelemetry #SRE
MCP is what makes âAI in the SOCâ usable.
Not the model. The integration layer. Standard connections to tools and data with controls that security teams can live with.
Breakdown: graylog.org/post/what-is...
#MCP #SecurityEngineering
CVE-2025-49144 is a local privilege escalation in the Notepad++ installer that abuses how regsvr32.exe is called during setup.
We break down:
⢠what it looks like on real systems
⢠why Sysmon catches it cleanly
⢠a high-signal Graylog search + Sigma rule
graylog.org/post/detecti...
Security teams buy âone more toolâ to reduce toil.
Then investigations turn into nine tabs and a Slack thread.
As @socalledseth.com puts it: AI only pays off when it reduces steps inside the analystâs flow â not when it becomes tab #10.
Read the blog:
graylog.org/post/the-hum...
Security today is âWhereâs Waldoâ at terabyte scale.
ML-powered anomaly detection helps teams spot the behaviors that donât fit the norm, from zero-days to insider threats without drowning in alerts.
Click here: graylog.org/post/anomaly...
#CyberSecurity #MachineLearning #Graylog
Monitoring detects issues â observability helps you understand why they happen.
In modern distributed systems, you need both.
New blog: Monitoring vs. Observability + the pillars of telemetry (logs, metrics, traces).
đ graylog.org/post/observa...
#Observability #DevOps #Graylog
Audit logs arenât just âlogsâ. Theyâre proof.
Who acted? What changed? When? Where?
Discover audit logging basics, log types, compliance use cases, and best practices for security.
đ graylog.org/post/complia...
#CyberSecurity #Compliance #AuditLogging