Defend Against Cyber Threats With Encrypted Drives

Defend Against Cyber Threats With Encrypted Drives

Cyberattacks are increasing in both scale and complexity, making data protection one of the most critical challenges facing organizations today. While traditional security controls — such as firewalls, antivirus software, and network monitoring — continue to play an...
Syslog-ng development and AI

Syslog-ng development and AI

Recently, several people have asked about the syslog-ng project’s position on AI. In short, the answer is one of cautious optimism. We are open to using AI, but we do not allow it to take over any critical responsibilities from human developers. What does this...
Gobbling Up Insights: Graylog 7.0 Serves Up a Feast

Gobbling Up Insights: Graylog 7.0 Serves Up a Feast

A feast of new features. A cornucopia of new capabilities. A banquet of breakthroughs (and the T-day puns are just getting started). Graylog 7.0 brings a full plate of advancements that help security teams cut through noise, control cloud costs, and respond with...