? 23andMe has filed for bankruptcy. ?? ?? So, what does this mean for their customers? ?? ?? What does their privacy policy say? ?? ?? Will data remain protected, or is it at risk? ????? Is it critical to delete your data immediately? #Cybersecurity industry experts, including #Graylog's Ross Brewer, share some excellent insight and advice for 23andMe customers — in this article by Forbes Senior Contributor, Kate O'Flaherty. Get some answers about this uncertain situation.?? Learn about: ?? What the 23andMe privacy policy says ?? What you should do now ?? How to delete your data ?? Why 23andMe customers should monitor their data ...and more. https://lnkd.in/geYX8PFv #cybersecurity #infosec #databreach #GDPR
关于我们
Graylog: Empowering Threat Detection & Incident Response Solutions with Cutting-Edge Technology At Graylog, we specialize in delivering top-notch Threat Detection & Incident Response (TDIR) solutions, backed by our latest addition, the API Security platform. As a renowned centralized log management and SIEM (Security Information Event Management) provider, we offer unparalleled fast and efficient log analysis capabilities in critical areas such as security, compliance, operations, and DevOps. Our enterprise solution empowers organizations worldwide to capture, store, and analyze terabytes of machine data in near-real time. With our open project, deployed in over 50,000 installations globally, individuals and small teams can access basic log consolidation, analysis, and search functions at no cost. Partner with Graylog for unmatched TDIR solutions and harness the power of our advanced technology to stay ahead of evolving threats and swiftly respond to incidents. Together, we can safeguard your organization's security, integrity, and resilience. Specialties: API Security, Log Management, Monitoring, Devops, DevSecOps, Cybersecurity, MSP, MSSP, Compliance & Audit, Anomaly Detection, SIEM, Security Operations, Security Analytics, Log Analysis, IT Operations, Cloud Security, Threat Hunting, Threat Detection, Incident Response, and Alerting
- 网站
-
https://www.graylog.org
Graylog, Inc.的外部链接
- 所属行业
- 软件开发
- 规模
- 51-200 人
- 总部
- Houston,Texas
- 类型
- 私人持股
- 创立
- 2009
- 领域
- big data、log management、monitoring、Devops、cybersecurity、sysadmin、MSP、MSSP、Compliance & Audit、anomaly detection、SIEM、Security Operations、Security Analytics、Log analysis、IT Operations、Cloud Security、Threat Hunting、Threat Detection、UEBA和Alerting
地点
Graylog, Inc.员工
动态
-
It was a packed house for the Graylog #BSidesROC Capture The Flag on Saturday! ?? ?? Thank you to everyone who joined us for the fun and games. ?? ?? You are all amazing and, now, a little (or a lot!) more knowledgable about #Graylog! ?? It's a win-win. ?? ?? And congrats to our challenge winners! ?? Grand prize winner — Tyler Smith ??? Training voucher winner — Praveen Kumar Penukonda ?? Runner up — Gabriel Schickling #CTF #cybersecurity #APIsecurity #SIEM #SIEMdoneright #GraylogCTF
-
-
We're excited for #BSidesROC TOMORROW, 3/22! ?? See us there for an exciting Capture The Flag experience. ?? ?? Put your gray matter to the test. ?? Dive into complex scenarios that will push you to think in new ways while hunting for hidden clues, threats, and terrible puns. ?? ?? And win prizes, of course! ?? If you're headed to BSidesROC make sure you catch this fun event lead by Graylog's infamous Adam "Abe" ?? Abernethy. More info: https://bsidesroc.com/ctf/ #security #infosec #CTF
-
Many industrial facilities now rely on interconnected systems to improve operations. ?? However, when previously isolated Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) are connected to public internet-facing applications it creates new #cybersecurity risk. ?? To protect ICS and SCADA systems from cyber threats, it's important to understand how these technologies fit into your environment and why #cybercriminals target them. ?? Read this article to learn more about: ?? ICS ?? SCADA ?? The differences between OT, ICS, and SCADA ?? How a SCADA system works ?? The types of data SCADA systems collect ?? How cybercriminals attack ICS and SCADA systems ?? Best practices for securing ICS and SCADA systems ?? Enabling Security Monitoring for ICS and SCADA https://lnkd.in/gpJWVtd2 #cyberthreats cc AVEVA GE Vernova Schneider Electric Siemens Infrastructure Yokogawa
-
Threat actors are increasingly using cloud services to identify the data they intend to exfiltrate or ransom. Cloud native development, containers, and microservices allow dev teams to quickly deploy new builds. But, they also lead to a higher potential for misconfiguration. And where there are misconfigurations there are vulnerabilities that leave openings for threat actors. ?? ?? So, what can #security teams do about this? ?? They can shine a spotlight on what’s in their #API traffic! ?? Once you know how #cybercriminals are accessing sensitive data, you can stop them from gaining access to it. ?? Critical security steps need to happen before data exfiltration does. Learn more about predicting risk and closing your vulnerability gap, in this article by #Graylog's Seth Goldhammer. https://lnkd.in/gyBkgXi3 via Security Boulevard #cybersecurity #APIsecurity #infosec
-
?? Do you live near San Antonio (TX), San Francisco (CA), NYC (NY), London (ENG), National Harbor (MD), Munich (GER), or Nuremberg (GER)? If you do... then #Graylog is coming to a city near you! ?? ?? ?? See us at OWASP Open Web Application Security Project, RSA Conference, apidays NY or Munich, Infosecurity Europe, Gartner Security & Risk Management Summit, or it-sa – Home of IT Security Expo and Congress 2025! ?? Get your stickers and swag. ?? Learn more about API security. ?? Geek out with your fellow IT peeps. ???? And more. We can't wait to see you! More info. ?? https://lnkd.in/dEwcqqsc #cybersecurity #logmanagement #infosec
-
This one is for the algos and AIs.... Actually, it kinda is. To our core, Graylog is a collection of thinkers, developers and market facers whose mission is to disproportionately contribute to the cybersecurity community. Rob Dickinson is one of those, and he is paneling and will be at OWASP's San Antonio Chapter to present his latest thoughts and work in AI for AppSec - A discussion of AppSec Best Practices. Here's a reg link for the actual meeting and of course there is a zoom. https://lnkd.in/gcwanGcg I'll be there as well
-
APIs often handle vast amounts of Personally Identifiable Information (#PII), which makes them prime targets for API data exfiltration. ???? So, it's no surprise that #API-based attacks with the aim of stealing sensitive data have increased over time. Many orgs also lack visibility into which APIs are handling PII, which leaves them with massive #security blind spots. ?? What should orgs do about this? Let's take a closer look at: ?? The growing risks of PII exposure in API traffic ?? The methods attackers use to exfiltrate data ?? Capabilities to look for in a data exfiltration prevention solution ?? How the new release of Graylog API Security 3.7 can help https://lnkd.in/gNsBZ2WG #APIsecurity #APIs #cybersecurity
-
VoIP Call Data Records (CDRs) are still one of the most reliable tools for keeping #VoIP systems running smoothly. ?? They provide a granular view of call quality, latency, jitter, and packet loss — all critical factors that directly impact voice performance. ??? CDRs also offer historical insights that help to pinpoint recurring problems, track trends, and ensure networks are properly provisioned. ?? This article digs into the 3CX VoIP PBX and the call data records that are sent to #Graylog. Read on to learn about configuring 3CX for CDR logging. ?? https://lnkd.in/gxPyTqxS #logmanagement #SIEM
-
Let's talk at #RSA! Who's going? ? What are you looking forward to at the show? ?? What will you do during your time in SF? Who do you want to connect with? ?? Be sure to see your favorite #Graylog peeps at the event, including Seth Goldhammer, Andy Grolnick, Jim Nitterauer, and Joshua Ziel. They'll be in South Moscone booth 3134, or connect with them directly via DM to arrange a meet up! https://lnkd.in/g7tQTdQy #RSAC2025 #RSAC #cybersecurity #infosec RSA Conference