Operations | Monitoring | ITSM | DevOps | Cloud

Logging

The latest News and Information on Log Management, Log Analytics and related technologies.

Sumo Logic and ZeroFOX Join Forces to Improve Visibility and Protect your Public Attack Surface

Today’s organizations have the challenge of managing several different applications and software within their technology stack. The more public-facing platforms an organization utilizes, the greater their public attack surface risks. Without proper protection, they and their community can become an easy target for malicious actors.

Prioritize and Investigate Vulnerabilities Identified by OpenVAS with Logz.io

With open source in our roots, we’re always excited about integrations with tools like OpenVAS, a popular open source vulnerability scanner that Greenbone Networks has maintained since 2009. If you’re not currently using OpenVAS, you can find the project here. OpenVAS contains more than 50,000 vulnerability tests with a community constantly updating its feed to adapt to the ever-evolving security landscape.

JFrog Log Analytics with Splunk

The JFrog Platform’s unity is powered by many microservices, each with its own log record. When even a small enterprise JPD might record millions of transaction events each day, operators need to be able to connect that data to a powerful analytics tool that can help find insights. JFrog now offers some tools that make that much easier to do, through the analytics and visualization tool you already use.

JFrog Log Analytics with Elasticsearch And Kibana

The JFrog Platform’s unity is powered by many microservices, each with its own log record. When even a small enterprise JPD might record millions of transaction events each day, operators need to be able to connect that data to a powerful analytics tool that can help find insights. JFrog now offers some tools that make that much easier to do, through the analytics and visualization tool you already use, including users of Elastic Stack.

Graph Analytics Using Splunk and the Machine Learning Toolkit

Almost all data in Splunk can be turned into graphs, and that's possibly something you may not have considered before. In your network traffic data, a source IP connects to a destination IP with attributes like bytes in/out, packets, ports, and other properties. Users log into an interconnected stack of systems, services, devices and applications which are connected with each other. Transactions run from A to B to C and may describe a process that helps you analye user journeys and business processes in general.

Cyber Security: Understanding the 5 Phases of Intrusion

Here at Graylog, we have recently had an increase in conversations with security teams from leading companies. We want to share our key findings with the Graylog community. The good thing is that cybercriminals use a methodical approach when planning an attack. By understanding their process and knowing your network, you will be better prepared and able to stay one step ahead.