Operations | Monitoring | ITSM | DevOps | Cloud

Log Forensics: The Basics of Finding Intel in Your Logs

Today’s post covers yet another log-related concept: log forensics. What’s this, and why should your organization care about it? Well, this is a topic related to logs, which are ubiquitous in the technology field. An IT organization that doesn’t generate many MBs worth of logs each day would be a rare occurrence nowadays. Even though logs are omnipresent, specific terms might not be so well-known. Not long ago, we covered log analytics, and today it’s log forensics time.

Best 13 Tools to Analyze Your Competitor's Website

Your website doesn’t exist in a vacuum, and there are likely competing websites. Some do better than you and get more traffic, engagement, and so on. Others don’t fare as well as you do. How do you make sure that your website is one of the successful ones and not one that’s likely to fail? Research.

Top 5 Cybersecurity Predictions for 2020

With 2020 around the corner, we’re entering a new decade in the cybersecurity landscape. What does the future hold for security professionals? We’d like to ring in the new year with good news, but the truth is that hackers will become smarter and breaches will grow in scale and number, creating an even greater pressure for security teams to keep up. Read our five predictions for 2020 to understand what to look out for and how to prepare for the new decade.

The Missing Functionalities of Service Mesh Technologies - Native Anomaly Detection and Incident Correlation

Rapid software release is the new norm – and that has pushed many companies to ditch their monolithic software development approach in favor of SOA. More companies are embracing microservices – an SOA-style approach for developing and deploying business logic as small, independently deployed services – for a number of reasons: it reduces risk, is faster to deploy and it easily scales.

Enhancing AWS security with Graylog centralized logging

AWS is a popular destination for IaaS that offers quickly saleable resources to meet even the largest customer demands. Cloud scalability like this can generate a large amount of logs you need to monitor to keep up with your cybersecurity goals. Getting those logs into a SIEM or centralized log management platform such as Graylog is key to have proactive monitoring and alerting.

What Is Log Collection? The Value of Unifying Your Logging

If you work in IT, especially on the decision-making side, then you should be aware of how vital logging is. When things go wrong with software in production, a solid logging approach often is the difference between hours of fruitless troubleshooting and an easy fix. Today, we’re here to talk about logging by covering a specific angle. Namely, we’ll answer the question, “What is log collection?”

Elastic Advent Calendar, 2019: the full recap!

Wow, it's finally here! After 25 fantastic articles we've reached the end of the 2019 Elastic Advent series. We've covered Elasticsearch and Python, Auditbeat, ECS, data transform, jvm options, anomaly detector models, Maps, SSL configuration, Smart query cancellation, data transforms, SLM, the new enrich processor, App Search, and so much more. In the topics we've spoken in German, Greek, English, French, Finish, Spanish and Swedish.