Graylog (@graylog2) 's Twitter Profile
Graylog

@graylog2

๐ŸŒ Trusted Threat Detection & Incident Response solutions. Experience the difference with our unmatched capabilities. #SIEM #APISecurity #LogManagement

ID: 182323597

linkhttps://www.graylog.org/ calendar_today24-08-2010 10:11:05

5,5K Tweet

9,9K Followers

2,2K Following

Graylog (@graylog2) 's Twitter Profile Photo

What might the future hold when it comes to the role of #datalakes in #SIEM? In this SecurityInfoWatch article #Graylog's Joshua Ziel explains what orgs need to know when it comes to how data & data storage affect cost & the impact on their #cybersec strategy. graylog.info/4gVdyro

Graylog (@graylog2) 's Twitter Profile Photo

Aiming for 100% patching of even critical/high severity vulnerabilities can feel like chasing the wind.๐ŸŒฌ๏ธ๐Ÿƒ So, what should #cybersecurity pros do? They should focus on what matters! Here's how you can get help with prioritizing all of those those #CVEs.โคต๏ธ graylog.info/3DGcCsP

Graylog (@graylog2) 's Twitter Profile Photo

IP address data is useful for many #cybersecurity functions. It can identify a userโ€™s devices or prevent potentially harmful incoming communications by using a known malicious range. Learn how IP lookup data can improve your cybersecurity, and more. graylog.info/4gO97z2

Graylog (@graylog2) 's Twitter Profile Photo

We're on the list!๐Ÿ“‹๐Ÿ™Œ #Graylog has been included in Built In's 50 Best Midsized Places To Work For In #Houston, 2025 & 100 Best Places To Work For In Houston, 2025. Congrats to the entire Graylog team!๐ŸŽ‰ ๐Ÿ‘€See where we ranked: graylog.info/422qFD3 #BPTW2025 #2025BuiltInBest

We're on the list!๐Ÿ“‹๐Ÿ™Œ #Graylog has been included in <a href="/BuiltIn/">Built In</a>'s 50 Best Midsized Places To Work For In #Houston, 2025 &amp; 100 Best Places To Work For In Houston, 2025. Congrats to the entire Graylog team!๐ŸŽ‰ 

๐Ÿ‘€See where we ranked:
graylog.info/422qFD3 #BPTW2025 #2025BuiltInBest
The Hacker News (@thehackersnews) 's Twitter Profile Photo

๐Ÿšจ China-linked RedDelta hackers are targeting Southeast Asia, Mongolia & Taiwan with custom PlugX backdoors in a series of espionage attacks. โคท New tactic: Using Cloudflare CDN to mask malicious traffic โคท Spyware deployed: Custom PlugX backdoor Read: thehackernews.com/2025/01/reddelโ€ฆ

Graylog (@graylog2) 's Twitter Profile Photo

"Expect a Darwinian consolidation in the #security software industry next year & beyond..." says #Graylog's Andy Grolnick. And, what about the #AI hype cycle of 2024? Are we in for more of the same? Plus, will the good guys overtake the bad guys?๐Ÿฆธโ€โ™‚๏ธ๐Ÿ˜ˆ ๐Ÿค”๐Ÿ‘‡graylog.info/3DR0GEF

Blue Team Village (@blueteamvillage) 's Twitter Profile Photo

If youโ€™re at #shmoocon and happen to see someone with a BTV backpack, come say hi and get some swag! Limited quantities available.

If youโ€™re at #shmoocon and happen to see someone with a BTV backpack, come say hi and get some swag! Limited quantities available.
Graylog (@graylog2) 's Twitter Profile Photo

Many orgs who use #Graylog are logging sensitive data with #PII, health data, or financial data. So, to ensure compliance with #dataprivacy laws this info must be redacted. Here's a simple way to process pipelines & scrub PII from log messages when needed. graylog.info/4fOKTDu

RSA Conference (@rsaconference) 's Twitter Profile Photo

Ready to be crowned "Most Innovative Startup 2025"? Submissions for the #RSAC Innovation Sandbox contest open TODAY, and close February 14. This year, the Top 10 Finalists will receive a $5 million uncapped SAFE investment. Learn more here: spr.ly/6012aph4r

Ready to be crowned "Most Innovative Startup 2025"? Submissions for the #RSAC Innovation Sandbox contest open TODAY, and close February 14. This year, the Top 10 Finalists will receive a $5 million uncapped SAFE investment. Learn more here: spr.ly/6012aph4r
Graylog (@graylog2) 's Twitter Profile Photo

Security #datalakes & #datawarehouses are repositories that enable orgs to store large amounts of #security #data. Is it time for your org to build a security #datalake strategy? ๐Ÿ—๏ธ Let's explore some important details about security data management. ๐Ÿ‘€ graylog.info/3E56aLR

The Hacker News (@thehackersnews) 's Twitter Profile Photo

๐Ÿ”“ New macOS flaw (CVE-2024-44243) discovered! Attackers could have bypassed crucial protections to install persistent malware and rootkits, potentially letting them take full control of your system. Explore the details: thehackernews.com/2025/01/microsโ€ฆ

The Hacker News (@thehackersnews) 's Twitter Profile Photo

๐Ÿ”ด Critical Alert: Microsoft has just released a massive patch for 161 vulnerabilities across its software, including 3 zero-day flaws that have been actively exploited. โคท CVE-2025-21333 โคท CVE-2025-21334 โคท CVE-2025-21335 Patch now: thehackernews.com/2025/01/3-actiโ€ฆ

Graylog (@graylog2) 's Twitter Profile Photo

Let's talk about your DNS infrastructure and its #security.๐Ÿ”’๐Ÿ‘€ This is the translator for cloud-based operations for continued services, and it's important to make sure that it's secure. Take a look at 6 DNS #cyberattack types and how to prevent them.๐Ÿ™Œ graylog.info/4ags22S

The Hacker News (@thehackersnews) 's Twitter Profile Photo

๐Ÿ”’ A new flaw (CVE-2024-7344) in UEFI systems has been discovered, letting attackers run unsigned code during system bootโ€”even with Secure Boot enabled. Read more โžก๏ธ thehackernews.com/2025/01/new-ueโ€ฆ

Graylog (@graylog2) 's Twitter Profile Photo

It's been an awesome few days at the #Graylog company-wide get together in Charleston, SC.๐ŸŽ‰ One highlight was our awards ceremony where we honored some particularly impactful team members.๐Ÿ‘ Congrats on some amazing achievements & thank you for being such great roll models! ๐Ÿ†

It's been an awesome few days at the #Graylog company-wide get together in Charleston, SC.๐ŸŽ‰ One highlight was our awards ceremony where we honored some particularly impactful team members.๐Ÿ‘

Congrats on some amazing achievements &amp; thank you for being such great roll models! ๐Ÿ†
Graylog (@graylog2) 's Twitter Profile Photo

Great discussion about innovation in cyber tech!๐Ÿ’ก Bill Kerschbaum & #Graylog's Seth Goldhammer discuss why innovation is necessary, pressure on cyber tech companies to push innovation to the next level, the different inputs that go into a product, +more. graylog.info/4jkgC2o

Graylog (@graylog2) 's Twitter Profile Photo

We had an awesome time last week in Charleston, SC at our company gathering! ๐ŸŽŠ From morning jogs, to volunteering + giving back to the community, to productive meetings (hello "Sheloggers") & more. We're pumped & ready for 2025.๐Ÿ’ช Let's go!๐Ÿš€ #cybersecurity #APIsecurity #SIEM

We had an awesome time last week in Charleston, SC at our company gathering! ๐ŸŽŠ From morning jogs, to volunteering + giving back to the community, to productive meetings (hello "Sheloggers") &amp; more.

We're pumped &amp; ready for 2025.๐Ÿ’ช Let's go!๐Ÿš€ #cybersecurity #APIsecurity #SIEM
Graylog (@graylog2) 's Twitter Profile Photo

Good log management is about managing your reports in the most efficient way possible. To do that you need: โ˜‘๏ธA comprehensive log management & collection function โ˜‘๏ธCentralized log monitoring & analysis โ˜‘๏ธData pipeline management โ˜‘๏ธAlerts & notifications graylog.info/40k4qWI