Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Logs & Lattes: Episode 2 - From Noise to Action: Smarter Security Ops That Reduce Risk

Security teams are overwhelmed by alerts, but which ones really matter? In this episode of Logs & Lattes, host Palmer Wallace talks with Rich Murphy, Senior Product Manager at Graylog, about how smarter security operations help teams cut through the noise and focus on what truly reduces risk. From alert fatigue to risk-first response, they unpack practical ways to prioritize real threats, automate with context, and make incident response faster and more effective. Learn how modern SOCs are evolving beyond alert overload to focus on meaningful, risk-based action.

From Noise to Action: Smarter Security Ops That Reduce Risk

In this episode of Logs & Lattes, host Palmer Wallace talks with Rich Murphy, Senior Product Manager at Graylog, about how smarter security operations help teams cut through the noise and focus on what truly reduces risk. From alert fatigue to risk-first response, they unpack practical ways to prioritize real threats, automate with context, and make incident response faster and more effective. Learn how modern SOCs are evolving beyond alert overload to focus on meaningful, risk-based action.

From Tool Sprawl to One Platform: How Graylog Simplifies Security Visibility

Security operations are buried under too many tools. Analysts switch between consoles, piece together context by hand, and burn valuable hours reconciling data that should already work together. According to Gartner, security leaders use an average of 19 different tools, and 80% say this level of complexity creates blind spots. This fragmentation slows down detection and response, drives up costs, and wears out teams that are already stretched thin.

SIEM's Next Chapter: Evolving, Not Dying

The obituary for SIEM has been written more than once. The latest headline from Dark Reading calls it “dying a slow death.” Catchy. But wrong. If you work in a SOC, you already know the need for centralized, contextualized visibility is not going anywhere. What is changing the future of SIEM, is how SIEM delivers it. If you are still thinking of SIEM as a clunky, high-cost log hoarder, you are stuck in the wrong decade.

How Graylog Helps You Spot LockBit-Style Attacks Sooner

The DFIR Report recently detailed a LockBit attack with ransomware intrusion that succeeded without advanced exploits or zero-day vulnerabilities. The attack relied on a stolen AnyDesk installer, credential reuse, and renamed PowerShell scripts that blended into routine activity. These moves were not sophisticated, but they were fast and effective. The end result: complete domain encryption.

Smart Logging Without the Price Trap

How much value are you really getting from your logs, and what are you giving up to stay on budget? In this episode of Logs and Lattes, host Palmer Wallace sits down with Seth Goldhammer, VP of Product Management at Graylog, for a candid conversation about the hidden cost of traditional SIEM pricing. Seth explains how ingest-based and resource-heavy licensing models pressure security teams into tough tradeoffs, such as dropping logs, tuning down detections, or limiting retention just to avoid budget overages.

Security Pipelines Are Broken. Here's How to Fix Them

There’s a quiet failure at the heart of many security programs. It’s not a lack of data. It’s too much of the wrong data. Telemetry pipelines built for volume, not visibility, now flood teams with noise instead of insight. The result? More alerts. Slower response. Overworked analysts are stuck maintaining ingestion rules instead of catching real threats.

The Value of a Robust Vulnerability Management Program

Back before live security video feeds in homes, people would walk around at night checking to make sure they locked every window and door. They took these precautions because they knew that a single open lock gave burglars an opportunity to steal from them. For organizations, vulnerability management programs are a way to lock the doors against cybercriminals.

Graylog SIEM on AWS | Smarter Security Without Compromise

Choosing a SIEM doesn’t have to mean trade-offs. This video shows how Graylog SIEM on AWS delivers fast detection, predictable costs, and analyst-friendly workflows — without the compromises that hold legacy platforms back. Legacy ingest-based SIEMs force security teams to pick between visibility, cost, and analyst efficiency. Graylog changes that model with flat, transparent pricing, license-free data lake storage, and flexible deployment options.

Compliance vs Security: The Business Value of Alignment

Compliance is not, nor has it ever been, security. Compliance is the spellcheck of the security world. Security is the work that people do every day to implement, enforce, and monitor the controls that protect systems, networks, applications, devices, users, and data. Compliance is the process of reviewing security work to ensure that it functions as intended. Compliance is an important component of an organization’s security posture.