Syslog-ng 101, part 11: Enriching log messages

Syslog-ng 101, part 11: Enriching log messages

This is the eleventh part of my syslog-ng tutorial. Last time, we learned about message parsing using syslog-ng. Today, we learn about enriching log messages. You can watch the video or read the text below. YouTube Link: https://youtu.be/tFHyvLgiSyI   Enriching...
Common cloud migration challenges and 7 steps to overcome them

Common cloud migration challenges and 7 steps to overcome them

Cloud migration challenges — capacity, throughput, performance and above all security — confront everyone in organizations from leaders and managers to users. Digital transformation has been well documented for many years but as a baseline, let’s define it as the...
How a Remote Workforce Impacts Your Data Security

How a Remote Workforce Impacts Your Data Security

You did it. Many months ago, you sent your employees home armed with their laptops, a few passwords, and a couple of Zoom invites. Now, hunkered down in their stretchy, comfy clothes, thankful for not having to commute, they’re carrying on the day-to-day business...
Graylog Expands Presence in Asia Pacific

Graylog Expands Presence in Asia Pacific

ANNOUNCES PARTNERSHIP WITH DT ASIA TO ADDRESS GROWING DEMAND FOR THREAT DETECTION & INCIDENT RESPONSE SOLUTIONS HONG KONG, 13 June 2023 — Graylog, an award-winning Security Information and Event Management (SIEM) solution, announced today that it is strengthening...