Operations | Monitoring | ITSM | DevOps | Cloud

Graylog

Enhancing Alerts with AI: Leveraging Amazon Bedrock and LLM's for Graylog

In this talk, we’ll explore the cutting-edge work InfusionPoints has done to process and enrich alerts from Graylog using Amazon Bedrock and advanced Large Language Models (LLMs) from Amazon Titan and Anthropic. Discover how we’ve harnessed the power of AI to elevate the accuracy, relevance, and actionable insights of our security alerts, transforming how we respond to potential threats.

Reducing Risk by Prioritizing Use Case Development

The session is really about customers spending their resources wisely, prioritizing use case development based on blind spots, weaknesses, or maybe even just plain audit findings. We have all been guilty in the past of spending a lot of time building clever use cases just for them to never fire or not work out the way we’d hoped; this talk is aimed at highlighting this issue and teach users to focus their resources and build a strategy for development like any other process they would internally.

The Why and What of AWS Lambda Monitoring

Serverless architectures are the rental tux of computing. If you’re using AWS to manage and scale your underlying infrastructure, you’re renting compute time or storage space. Your Lambda functions are the tie or cummerbund you purchase to customize your rental. Using the AWS event-driven architecture improves business agility, allowing you to move quickly. Lambda is the on-demand compute services that runs custom code driving an event’s response.

Real World Journey's with Graylog

Join an engaging panel discussion featuring Graylog customers as they share their experiences and lessons learned on their journey with Graylog. Moderated by Mark Brooks, Graylog's Customer Success Officer, the panel will explore diverse use cases, the process of evaluating SIEM solutions, managing complex environments, and the unique advantages of leveraging open-source technology. Gain valuable insights from real-world implementations and discover how these organizations optimized their security operations using Graylog.

Understanding Ubuntu Logs

Linux, Debian, and Ubuntu are the Kirk, Spock, and McCoy of modern application development. The Captain Kirk, Linux, is the open-source central code for directing and talking to hardware. Debian sits as the trio’s Spock, the original distro that can be seen as more complex to install and use. As a Debian child distro, Ubuntu is the McCoy, helping to heal the challenges that people have when trying to use Debian.

Understanding IoT Logging Formats in Azure and AWS

Internet of Things (IoT) devices are everywhere you look. From the smartwatch on your wrist to the security cameras protecting your offices, connected IoT devices transmit all kinds of data. However, these compact devices are different from the other technologies your organization uses. Unlike traditional devices, IoT devices lack a standardized set of security capabilities, making them easier for attackers to exploit.