Graylog (@graylog2) 's Twitter Profile
Graylog

@graylog2

🌍 Trusted Threat Detection & Incident Response solutions. Experience the difference with our unmatched capabilities. #SIEM #APISecurity #LogManagement

ID: 182323597

linkhttps://www.graylog.org/ calendar_today24-08-2010 10:11:05

5,5K Tweet

9,9K Takipçi

2,2K Takip Edilen

Graylog (@graylog2) 's Twitter Profile Photo

What might the future hold when it comes to the role of #datalakes in #SIEM? In this SecurityInfoWatch article #Graylog's Joshua Ziel explains what orgs need to know when it comes to how data & data storage affect cost & the impact on their #cybersec strategy. graylog.info/4gVdyro

Graylog (@graylog2) 's Twitter Profile Photo

Aiming for 100% patching of even critical/high severity vulnerabilities can feel like chasing the wind.🌬️🏃 So, what should #cybersecurity pros do? They should focus on what matters! Here's how you can get help with prioritizing all of those those #CVEs.⤵️ graylog.info/3DGcCsP

Graylog (@graylog2) 's Twitter Profile Photo

IP address data is useful for many #cybersecurity functions. It can identify a user’s devices or prevent potentially harmful incoming communications by using a known malicious range. Learn how IP lookup data can improve your cybersecurity, and more. graylog.info/4gO97z2

Graylog (@graylog2) 's Twitter Profile Photo

We're on the list!📋🙌 #Graylog has been included in Built In's 50 Best Midsized Places To Work For In #Houston, 2025 & 100 Best Places To Work For In Houston, 2025. Congrats to the entire Graylog team!🎉 👀See where we ranked: graylog.info/422qFD3 #BPTW2025 #2025BuiltInBest

We're on the list!📋🙌 #Graylog has been included in <a href="/BuiltIn/">Built In</a>'s 50 Best Midsized Places To Work For In #Houston, 2025 &amp; 100 Best Places To Work For In Houston, 2025. Congrats to the entire Graylog team!🎉 

👀See where we ranked:
graylog.info/422qFD3 #BPTW2025 #2025BuiltInBest
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 China-linked RedDelta hackers are targeting Southeast Asia, Mongolia & Taiwan with custom PlugX backdoors in a series of espionage attacks. ⤷ New tactic: Using Cloudflare CDN to mask malicious traffic ⤷ Spyware deployed: Custom PlugX backdoor Read: thehackernews.com/2025/01/reddel…

Graylog (@graylog2) 's Twitter Profile Photo

"Expect a Darwinian consolidation in the #security software industry next year & beyond..." says #Graylog's Andy Grolnick. And, what about the #AI hype cycle of 2024? Are we in for more of the same? Plus, will the good guys overtake the bad guys?🦸‍♂️😈 🤔👇graylog.info/3DR0GEF

Blue Team Village (@blueteamvillage) 's Twitter Profile Photo

If you’re at #shmoocon and happen to see someone with a BTV backpack, come say hi and get some swag! Limited quantities available.

If you’re at #shmoocon and happen to see someone with a BTV backpack, come say hi and get some swag! Limited quantities available.
Graylog (@graylog2) 's Twitter Profile Photo

Many orgs who use #Graylog are logging sensitive data with #PII, health data, or financial data. So, to ensure compliance with #dataprivacy laws this info must be redacted. Here's a simple way to process pipelines & scrub PII from log messages when needed. graylog.info/4fOKTDu

RSA Conference (@rsaconference) 's Twitter Profile Photo

Ready to be crowned "Most Innovative Startup 2025"? Submissions for the #RSAC Innovation Sandbox contest open TODAY, and close February 14. This year, the Top 10 Finalists will receive a $5 million uncapped SAFE investment. Learn more here: spr.ly/6012aph4r

Ready to be crowned "Most Innovative Startup 2025"? Submissions for the #RSAC Innovation Sandbox contest open TODAY, and close February 14. This year, the Top 10 Finalists will receive a $5 million uncapped SAFE investment. Learn more here: spr.ly/6012aph4r
Graylog (@graylog2) 's Twitter Profile Photo

Security #datalakes & #datawarehouses are repositories that enable orgs to store large amounts of #security #data. Is it time for your org to build a security #datalake strategy? 🏗️ Let's explore some important details about security data management. 👀 graylog.info/3E56aLR

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🔓 New macOS flaw (CVE-2024-44243) discovered! Attackers could have bypassed crucial protections to install persistent malware and rootkits, potentially letting them take full control of your system. Explore the details: thehackernews.com/2025/01/micros…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🔴 Critical Alert: Microsoft has just released a massive patch for 161 vulnerabilities across its software, including 3 zero-day flaws that have been actively exploited. ⤷ CVE-2025-21333 ⤷ CVE-2025-21334 ⤷ CVE-2025-21335 Patch now: thehackernews.com/2025/01/3-acti…

Graylog (@graylog2) 's Twitter Profile Photo

Let's talk about your DNS infrastructure and its #security.🔒👀 This is the translator for cloud-based operations for continued services, and it's important to make sure that it's secure. Take a look at 6 DNS #cyberattack types and how to prevent them.🙌 graylog.info/4ags22S

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🔒 A new flaw (CVE-2024-7344) in UEFI systems has been discovered, letting attackers run unsigned code during system boot—even with Secure Boot enabled. Read more ➡️ thehackernews.com/2025/01/new-ue…

Graylog (@graylog2) 's Twitter Profile Photo

It's been an awesome few days at the #Graylog company-wide get together in Charleston, SC.🎉 One highlight was our awards ceremony where we honored some particularly impactful team members.👏 Congrats on some amazing achievements & thank you for being such great roll models! 🏆

It's been an awesome few days at the #Graylog company-wide get together in Charleston, SC.🎉 One highlight was our awards ceremony where we honored some particularly impactful team members.👏

Congrats on some amazing achievements &amp; thank you for being such great roll models! 🏆
Graylog (@graylog2) 's Twitter Profile Photo

Great discussion about innovation in cyber tech!💡 Bill Kerschbaum & #Graylog's Seth Goldhammer discuss why innovation is necessary, pressure on cyber tech companies to push innovation to the next level, the different inputs that go into a product, +more. graylog.info/4jkgC2o

Graylog (@graylog2) 's Twitter Profile Photo

We had an awesome time last week in Charleston, SC at our company gathering! 🎊 From morning jogs, to volunteering + giving back to the community, to productive meetings (hello "Sheloggers") & more. We're pumped & ready for 2025.💪 Let's go!🚀 #cybersecurity #APIsecurity #SIEM

We had an awesome time last week in Charleston, SC at our company gathering! 🎊 From morning jogs, to volunteering + giving back to the community, to productive meetings (hello "Sheloggers") &amp; more.

We're pumped &amp; ready for 2025.💪 Let's go!🚀 #cybersecurity #APIsecurity #SIEM
Graylog (@graylog2) 's Twitter Profile Photo

Good log management is about managing your reports in the most efficient way possible. To do that you need: ☑️A comprehensive log management & collection function ☑️Centralized log monitoring & analysis ☑️Data pipeline management ☑️Alerts & notifications graylog.info/40k4qWI