Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Security Incident and Event Management.

The Golden Throne: Stop Blindly Flushing

Most folks build their SIEM the same way they load a junk drawer: by shoving in whatever they already have—Active Directory, firewalls, and a whole lot of “eh, why not.” But at Graylog, we think you deserve better than a glorified log toilet. In this talk, we’ll flip the script: start with the problems you’re actually trying to solve, then figure out what you need to know, then what data supports that. And with Graylog’s Intelligent Data Routing, you can now act on that plan—sending high-value data to hot storage and archiving the rest to standby storage for when (and if) it’s needed. Build your SIEM like it has a brain—and a budget.

Falcon Next-Gen SIEM & Onum: Real-Time Telemetry Control and Federated Search

Discover how Falcon Onum and Falcon Next-Gen SIEM work together to optimize telemetry upstream and enable federated search across hot and archived data. Reduce ingestion overhead, maintain full visibility, and investigate across multiple data stores from a single platform.

The Ingestion Cost Problem the SOC Can No Longer Ignore

Security teams are collecting more telemetry across endpoints, cloud workloads, and SaaS platforms, but the cost of bringing that data into the SIEM keeps rising. What used to be a straightforward operational decision has become a central budget challenge. Security teams are not struggling with collecting data, they are struggling with affording to keep it, and when ingestion cost drives visibility decisions, the SOC loses ground.

The Island of Misfit Logs: Logging the Weird Stuff

Follow Joel Duffield while he talks about why some systems just don’t want to be logged. Whether it’s your backup tool that only sends email alerts, your budget IoT device that wasn’t built for enterprises, or that one SaaS app stuck on the free tier—there’s no clean way to get their messages into your SIEM.

Understanding the European Cybersecurity Certification Framework

The European Union (EU) cybersecurity regulatory landscape is reminiscent of a medieval tapestry full of interwoven threads that complement one another to create the larger picture. Regulation (EU) 2019/881 created the foundation for information and communications technology (ICT) cybersecurity certification.

The coefficient of security friction is slowing teams down. How can you fix it?

Like the sands through the hourglass, so are the days of our SOC lives…. An alert surfaces, and while it doesn’t immediately signal a critical incident, it carries just enough ambiguity to require attention. An analyst opens the investigation, begins pulling in context, reviews authentication activity, pivots into endpoint data, and checks for any corresponding changes in the cloud environment.

The New CISO Ep. 143 - Myke Lyons | From Chef to CISO: Unlocking the Recipe to Security Leadership

What does sharpening a knife over a case of onions have to do with incident response? For Myke Lyons, CISO at Cribl, the answer is everything. Myke trained at the Culinary Institute of America — learning speed and accuracy under the clock of a professional kitchen — before a summer IT job in Manhattan set him on an entirely different path. In this episode of The New CISO, host Steve Moore traces that journey and the surprising parallels between culinary craft and security leadership.