Houston, TX, USA
Sep 22, 2023   |  By Jeff Darrington
Sitting at your desk, coding away with another cup of your favorite caffeine-infused beverage, you might be thinking to yourself, “it’s true what they say about no rest for the weary.” If you’re developing an app or architecting a cloud-native system, you can actually get the REST you need with the right Application Programming Interface (API). REST APIs provide a scalable, flexible, easy-to-use interface that makes developing and connecting web apps easier.
Sep 19, 2023   |  By Jeff Darrington
Application Programming Interfaces (APIs) act as bridges between applications so they can share data. APIs are fundamental to the complex, interconnected systems, enabling organizations to streamline business processes and reduce redundancies. REST APIs are easy to use and understand because they use the same noun- and verb-based format as HTTP. Simultaneously, attackers know how to manipulate this language, making REST APIs a common attack target.
Sep 13, 2023   |  By Jeff Darrington
Anyone tracking the evolution of the IT industry is probably familiar with the concept of Industry 4.0. Essentially, it describes the process by which traditional industrial tasks become both digitized and continually managed in an IT-like fashion via modern technologies like cloud computing, digital twins, Internet of Things (IoT) sensorization, and artificial intelligence/machine learning.
Sep 11, 2023   |  By Jeff Darrington
If you want to visualize how data flows across your connected applications, you can think back to that childhood game of Chutes and Ladders (also called Snakes and Ladders). As a kid, the board felt like a confusing grid that had the weirdest, seemingly arbitrary connections between blocks. In your modern digital environment, your Application Programming Interfaces (APIs) fulfill the same role that the ladders and chutes/snakes fulfilled, connecting disparate blocks across a larger whole.
Aug 31, 2023   |  By Jeff Darrington
When people talk about complex, interconnected ecosystems, they’re really talking about how applications share data and communicate with each other. Like the air-lock on a spaceship lets people pass between physical environments, Application Programming Interfaces (APIs) enable data to pass between digital environments. However, since APIs act as access points between applications, they create potential security risks.
Aug 21, 2023   |  By Jeff Darrington
While security teams may “run on Dunkin’,” companies run on applications. From Salesforce and Hubspot to ServiceNow and Jira, your organization relies on a complex, interconnected application ecosystem. In 2022, organizations used an average of 130 Software-as-a-Service (SaaS) applications. While these technologies enabled them to reduce costs and achieve revenue targets, they created new security risks.
Aug 16, 2023   |  By The Graylog Team
The Trusted Information Security Assessment Exchange (TISAX) is the certification process for engaging in the Verband der Automobilindustrie (VDA), the German Association of the Automotive Industry, Information Security Assessment (ISA). The ENX Association, a collection of automobile manufacturers, suppliers, and four national automotive associations, established TISAX to create an overarching industry standard and make reporting more efficient.
Aug 2, 2023   |  By Jeff Darrington
Your business runs on servers. Without your DNS server, your users wouldn’t be able to connect to online resources. Without your proxy servers, your local networks would be visible across the public internet. Without your database servers, your organization wouldn’t be able to execute the queries that enable them to make data-driven decisions. Since servers are critical to business operations, threat actors value them.
Jul 31, 2023   |  By The Graylog Team
Back in the early days of corporate networking, IT departments typically deployed firewalls to keep employees from accessing non-work related content, like social media sites. While content filtering remains part of a firewall’s job, it’s no longer the primary reason for using one. In today’s connected world, firewalls are fundamental to network security.
Jul 19, 2023   |  By Graylog
Strengthens Threat Detection and Incident Response Portfolio to address Growing API Threats.
Jun 29, 2022   |  By Graylog
In todays video, Jeff, takes you through a quick Graylog Security demo. Download Graylog Graylog on Social Media Graylog
May 25, 2022   |  By Graylog
Jeff Darrington is back with a tour of the latest Graylog version.
May 25, 2022   |  By Graylog
Download Graylog Graylog on Social Media
May 17, 2022   |  By Graylog
In this video senior technical marketing manager, Jeff Darrington, takes you through logging call detail records.
Feb 8, 2022   |  By Graylog
In today's video Jeff Darrington shows you how to upgrade Graylog from V3 to V4.2. Download Graylog Graylog on Social Media Graylog
Jan 21, 2022   |  By Graylog
In today's video senior solutions engineer, Simon Huber, explains how Graylog is helping NHS Trusts: achieve their cyber essentials plus certification and meet their DSPT obligations.
Jan 13, 2022   |  By Graylog
In today's video Jeff Darrington takes you through the new Illuminate features as well as showing you how to upgrade to the newest version (V2).
Dec 15, 2021   |  By Graylog
Graylog experts Abe Abernethy and Jeff Darrington show you how to find the Log4j or Log4Shell with Graylog and integration with GreyNoise. #logmanagement #logmanagementdoneright Download Graylog Graylog on Social Media Graylog
Dec 14, 2021   |  By Graylog
Today Graylog Solution engineer, Simon Huber. Talks you through installing the process of installing a forwarder in the on premise environment.
Dec 6, 2021   |  By Graylog
Jeff is here once again, this time he is going through the new Graylog 4.2 features.
Jan 18, 2019   |  By Graylog
When it comes to security data enrichment, it's helpful to think beyond threat intelligence. This white paper explores viable standard and advanced third-party intelligence enrichment sources that are often overlooked.
Jan 1, 2019   |  By Graylog
In this guide, what to consider when selecting a source of threat intelligence and how to make threat intelligence work for your organization.
Jan 1, 2019   |  By Graylog
When alerts go unheeded or don't deliver next steps on how to mitigate threats, SIEM can become an expensive and ineffective tool.
Dec 1, 2018   |  By Graylog
This paper examines the critical criteria to consider when evaluating tools for managing your data. There are compelling reasons why Graylog is the best choice for log management and analysis.
Dec 1, 2018   |  By Graylog
The previous data protection directive passed long before the Internet became the primary marketplace for businesses. In light of recent data and privacy issues, consumers demand higher standards for more security.

Graylog is a leading centralized log management solution built to open standards for capturing, storing, and enabling real-time analysis of terabytes of machine data. We deliver a better user experience by making analysis ridiculously fast and efficient using a more cost-effective and flexible architecture. Thousands of IT professionals rely on Graylog's scalability, comprehensive access to complete data, and exceptional user experience to solve security, compliance, operational, and DevOps issues every day.

Purpose-built for modern log analytics, Graylog removes complexity from data exploration, compliance audits, and threat hunting so you can find meaning in data more easily and take action faster.