Podcasts about graylog

  • 23PODCASTS
  • 45EPISODES
  • 1h 1mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Mar 31, 2025LATEST
graylog

POPULARITY

20172018201920202021202220232024


Best podcasts about graylog

Latest podcast episodes about graylog

Paul's Security Weekly
Setting up your SIEM for success - Pitfalls to preclude and tips to take - Geoff Cairns, Neil Desai - ESW #400

Paul's Security Weekly

Play Episode Listen Later Mar 31, 2025 118:15


A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM. Are the right logs enabled? Is your EDR working correctly? Would you notice a sudden increase or decrease in events from critical sources? What can practitioners do to ensure the success of their SIEM deployment? This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about them! In this interview, we feature some research from Geoff Cairns, an analyst at Forrester Research. This is a preview to the talk he'll be giving at Identiverse 2025 in a few months. We won't have time to cover all the trends, but there are several here that I'm excited to discuss! Deepfake Detection Difficult Zero Trust Agentic AI Phishing resistant MFA adoption Identity Verification Machine Identity Decentralized Identity Post Quantum Shared Signals Segment Resources: The Top Trends Shaping Identity And Access Management In 2025 - (Forrester subscription required) In this week's enterprise security news, Big funding for Island Is DLP finally getting disrupted? By something that works? We learn all about Model Context Protocol servers Integrating SSO and SSH! Do we have too many cybersecurity regulations? Toxic cybersecurity workplaces Napster makes a comeback this week, we've got 50% less AI and 50% more co-hosts All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-400

Enterprise Security Weekly (Audio)
Setting up your SIEM for success - Pitfalls to preclude and tips to take - Geoff Cairns, Neil Desai - ESW #400

Enterprise Security Weekly (Audio)

Play Episode Listen Later Mar 31, 2025 118:15


A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM. Are the right logs enabled? Is your EDR working correctly? Would you notice a sudden increase or decrease in events from critical sources? What can practitioners do to ensure the success of their SIEM deployment? This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about them! In this interview, we feature some research from Geoff Cairns, an analyst at Forrester Research. This is a preview to the talk he'll be giving at Identiverse 2025 in a few months. We won't have time to cover all the trends, but there are several here that I'm excited to discuss! Deepfake Detection Difficult Zero Trust Agentic AI Phishing resistant MFA adoption Identity Verification Machine Identity Decentralized Identity Post Quantum Shared Signals Segment Resources: The Top Trends Shaping Identity And Access Management In 2025 - (Forrester subscription required) In this week's enterprise security news, Big funding for Island Is DLP finally getting disrupted? By something that works? We learn all about Model Context Protocol servers Integrating SSO and SSH! Do we have too many cybersecurity regulations? Toxic cybersecurity workplaces Napster makes a comeback this week, we've got 50% less AI and 50% more co-hosts All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-400

Paul's Security Weekly TV
Setting up your SIEM for success - Pitfalls to preclude and tips to take - Neil Desai - ESW #400

Paul's Security Weekly TV

Play Episode Listen Later Mar 30, 2025 32:16


A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM. Are the right logs enabled? Is your EDR working correctly? Would you notice a sudden increase or decrease in events from critical sources? What can practitioners do to ensure the success of their SIEM deployment? This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about them! Show Notes: https://securityweekly.com/esw-400

Enterprise Security Weekly (Video)
Setting up your SIEM for success - Pitfalls to preclude and tips to take - Neil Desai - ESW #400

Enterprise Security Weekly (Video)

Play Episode Listen Later Mar 30, 2025 32:16


A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM. Are the right logs enabled? Is your EDR working correctly? Would you notice a sudden increase or decrease in events from critical sources? What can practitioners do to ensure the success of their SIEM deployment? This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about them! Show Notes: https://securityweekly.com/esw-400

Paul's Security Weekly
SIEM: Shakeup in Event Management - What's Happening in the SIEM market today? - Jason Shockey, Seth Goldhammer - ESW #377

Paul's Security Weekly

Play Episode Listen Later Sep 27, 2024 119:45


The SIEM market has undergone some significant changes this summer. This is a great opportunity to talk about the current state of SIEM! In this conversation, we'll discuss: market changes and terminology: security analytics, data lakes, SIEM what is SOAR's role in the current SIEM market? machine learning and generative AI's role strategies for implementing a SIEM common mistakes that still lead to SIEMs becoming shelfware and much more! Both Seth and Adrian have a long history when it comes to SIEMs, so this conversation will be packed with anecdotes, stories, and lessons learned! This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about them! We've been hearing a lot lately about how the talent gap in cybersecurity is much more complex than some folks have been making it out to be. While making six figures after going through a six week boot camp might be overselling the cybersecurity job market a bit, it is definitely a complex space with lots of opportunities. Fortunately, we have folks building passion projects like My Cyber Path. When Jason transitioned into cyber from the military, he took note of the path he took. He also noticed how different the path was for many of his peers. Inspired by NIST NICE and other programs designed to help folks get a start in cyber, he created My Cyber Path. My Cyber Path has a very organized approach. There are 12 paths outlined, which fall into 4 main areas. After taking a personality test, this tool suggests the best paths for you. Hmmm, this sounds a lot like the sorting hat in Harry Potter, and there are 4 "houses" you could get put into... coincidence? Segment Resources: My Cyber Path has a free account where people can get matched to a cybersecurity work role based on their interests and personality traits and get access to free areas in the platform without having to save a credit card. https://www.mycyberpath.com/ https://www.mycyberpath.com/auth/register In the Enterprise News, the hosts discuss various trends and challenges in the cybersecurity landscape, including the evolution of terminology, funding trends, the emergence of new startups, and the impact of AI on security practices. They also explore the challenges faced by CISOs, the importance of humor in the industry, and the future of quantum readiness. The conversation highlights the need for clarity in cybersecurity messaging and the potential for consolidation in the market. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-377

Enterprise Security Weekly (Audio)
SIEM: Shakeup in Event Management - What's Happening in the SIEM market today? - Jason Shockey, Seth Goldhammer - ESW #377

Enterprise Security Weekly (Audio)

Play Episode Listen Later Sep 27, 2024 119:45


The SIEM market has undergone some significant changes this summer. This is a great opportunity to talk about the current state of SIEM! In this conversation, we'll discuss: market changes and terminology: security analytics, data lakes, SIEM what is SOAR's role in the current SIEM market? machine learning and generative AI's role strategies for implementing a SIEM common mistakes that still lead to SIEMs becoming shelfware and much more! Both Seth and Adrian have a long history when it comes to SIEMs, so this conversation will be packed with anecdotes, stories, and lessons learned! This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about them! We've been hearing a lot lately about how the talent gap in cybersecurity is much more complex than some folks have been making it out to be. While making six figures after going through a six week boot camp might be overselling the cybersecurity job market a bit, it is definitely a complex space with lots of opportunities. Fortunately, we have folks building passion projects like My Cyber Path. When Jason transitioned into cyber from the military, he took note of the path he took. He also noticed how different the path was for many of his peers. Inspired by NIST NICE and other programs designed to help folks get a start in cyber, he created My Cyber Path. My Cyber Path has a very organized approach. There are 12 paths outlined, which fall into 4 main areas. After taking a personality test, this tool suggests the best paths for you. Hmmm, this sounds a lot like the sorting hat in Harry Potter, and there are 4 "houses" you could get put into... coincidence? Segment Resources: My Cyber Path has a free account where people can get matched to a cybersecurity work role based on their interests and personality traits and get access to free areas in the platform without having to save a credit card. https://www.mycyberpath.com/ https://www.mycyberpath.com/auth/register In the Enterprise News, the hosts discuss various trends and challenges in the cybersecurity landscape, including the evolution of terminology, funding trends, the emergence of new startups, and the impact of AI on security practices. They also explore the challenges faced by CISOs, the importance of humor in the industry, and the future of quantum readiness. The conversation highlights the need for clarity in cybersecurity messaging and the potential for consolidation in the market. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-377

Paul's Security Weekly TV
SIEM: Shakeup in Event Management - What's Happening in the SIEM market today? - Seth Goldhammer - ESW #377

Paul's Security Weekly TV

Play Episode Listen Later Sep 27, 2024 42:42


The SIEM market has undergone some significant changes this summer. This is a great opportunity to talk about the current state of SIEM! In this conversation, we'll discuss: market changes and terminology: security analytics, data lakes, SIEM what is SOAR's role in the current SIEM market? machine learning and generative AI's role strategies for implementing a SIEM common mistakes that still lead to SIEMs becoming shelfware and much more! Both Seth and Adrian have a long history when it comes to SIEMs, so this conversation will be packed with anecdotes, stories, and lessons learned! This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about them! Show Notes: https://securityweekly.com/esw-377

Enterprise Security Weekly (Video)
SIEM: Shakeup in Event Management - What's Happening in the SIEM market today? - Seth Goldhammer - ESW #377

Enterprise Security Weekly (Video)

Play Episode Listen Later Sep 27, 2024 42:42


The SIEM market has undergone some significant changes this summer. This is a great opportunity to talk about the current state of SIEM! In this conversation, we'll discuss: market changes and terminology: security analytics, data lakes, SIEM what is SOAR's role in the current SIEM market? machine learning and generative AI's role strategies for implementing a SIEM common mistakes that still lead to SIEMs becoming shelfware and much more! Both Seth and Adrian have a long history when it comes to SIEMs, so this conversation will be packed with anecdotes, stories, and lessons learned! This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about them! Show Notes: https://securityweekly.com/esw-377

The CyberWire
The current state of XDR: A Rick-the-toolman episode.

The CyberWire

Play Episode Listen Later Jun 17, 2024 19:29


Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of “eXtended Detection and Response” (XDR) with CyberWire Hash Table guests Rick Doten, Centene's VP of Security, and Milad Aslaner, Sentinel One's XDR Product Manager. References: Alexandra Aguiar, 2023. Key Trends from the 2023 Hype Cycle for Security Operations [Gartner Hype Cycle Chart]. Noetic Cyber. Daniel Suarez, 2006. Daemon [Book]. Goodreads. Dave Crocker, 2020. Who Invented Email, Email History, How Email Was Invented [Websote]. LivingInternet. Eric Hutchins, Michael Cloppert, Rohan Amin, 2010, Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains [Paper] Lockheed Martin Corporation. Jon Ramsey, Mark Ryland, 2022. AWS co-announces release of the Open Cybersecurity Schema Framework (OCSF) project [Press Release]. Amazon Web Services. Nir Zuk, 2018. Palo Alto Networks Ignite USA '18 Keynote [Presentation]. YouTube. Raffael Marty, 2021. A Log Management History Lesson – From syslogd(8) to XDR [Youtube Video]. YouTube. Raffael Marty, 2021. A history lesson on security logging, from syslogd to XDR [Essay]. VentureBeat. Rick Howard, 2020. Daemon [Podcast]. Word Notes. Rick Howard, 2021. XDR: from the Rick the Toolman Series. [Podcast and Essay]. CSO Perspectives, The CyberWire. Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads. Staff, n.d. Open Cybersecurity Schema Framework [Standard]. GitHub. Staff, 2019. What is EDR? Endpoint Detection & Response Defined [Explainer]. CrowdStrike. Staff, 2020. Log Formats – a (Mostly) Complete Guide [Explainer]. Graylog. Stephen Watts, 2023. Common Event Format (CEF): An Introduction [Explainer]. Splunk. Thomas Lintemuth, Peter Firstbrook, Ayelet Heyman, Craig Lawson, Jeremy D'Hoinne, 2023. Market Guide for Extended Detection and Response [Essay]. Gartner. Learn more about your ad choices. Visit megaphone.fm/adchoices

Paul's Security Weekly
Achieving Cyber Resilience, External Cybersecurity & Risk Reduction - Margarita Barrero, Andy Grolnick, Alexandre Sieira - ESW Vault

Paul's Security Weekly

Play Episode Listen Later May 31, 2024 48:15


Organizations today are overwhelmed with the sheer magnitude of potential cybersecurity threats and there is plenty of vendor buzz around AI in Security products, but what is the reality? Threat detection and incident response (TDIR) strategy and execution have never been more critical and are essential in maintaining cyber resilience and strengthening the security posture of every organization. TDIR aims to identify potential threats and respond before they can impact a business. A layered defense focuses on identifying threat activity, prioritizing investigations, and measuring risk. As a result, organizations can take the appropriate threat mitigation steps. These security strategies and protocols signify a step forward with a TDIR strategy where everyone from the CISO to the security analyst wins. This segment is sponsored by Graylog. Visit https://securityweekly.com/graylogrsac to learn more about them! Axur is a cost-effective external cybersecurity solution that empowers security teams to handle threats beyond the perimeter. Our platform detects, inspects, and responds to brand impersonation, phishing scams, dark web mentions, threat intel vulnerabilities, and more. This segment is sponsored by Axur. Visit https://securityweekly.com/axurrsac to learn more about them! Segment Resources: https://www.axur.com/en-us/partners https://www.axur.com/en-us/outsourced-takedown https://www.axur.com/polaris/home Vendors, sales channels, partners and other kinds of third parties are essential to most businesses. Ensuring that the information security risks of those other companies don't impact your own is the remit of Third Party Cyber Risk Management (TPCRM) teams. It is increasingly evident, however, that the existing practices and tools are not up to the challenge. They make the process even more adversarial than it needs to be, are focused on risk transfer and/or acceptance rather than reduction; are based on limited and low quality signals; and are often excruciatingly manual. We can do better as an industry, and in this conversation we are going to explore a new paradigm for TPCRM and its advantages for third and first parties. Segment Resources: Alice in Supply Chains is a monthly marketing-free newsletter with curated news and commentary on TPCRM: https://www.linkedin.com/newsletters/alice-in-supply-chains-6976104448523677696/ This segment is sponsored by Tenchi Security. Visit https://securityweekly.com/tenchirsac to learn more about them! Show Notes: https://securityweekly.com/vault-esw-10

Enterprise Security Weekly (Audio)
Achieving Cyber Resilience, External Cybersecurity & Risk Reduction - Margarita Barrero, Andy Grolnick, Alexandre Sieira - ESW Vault

Enterprise Security Weekly (Audio)

Play Episode Listen Later May 31, 2024 48:15


Organizations today are overwhelmed with the sheer magnitude of potential cybersecurity threats and there is plenty of vendor buzz around AI in Security products, but what is the reality? Threat detection and incident response (TDIR) strategy and execution have never been more critical and are essential in maintaining cyber resilience and strengthening the security posture of every organization. TDIR aims to identify potential threats and respond before they can impact a business. A layered defense focuses on identifying threat activity, prioritizing investigations, and measuring risk. As a result, organizations can take the appropriate threat mitigation steps. These security strategies and protocols signify a step forward with a TDIR strategy where everyone from the CISO to the security analyst wins. This segment is sponsored by Graylog. Visit https://securityweekly.com/graylogrsac to learn more about them! Axur is a cost-effective external cybersecurity solution that empowers security teams to handle threats beyond the perimeter. Our platform detects, inspects, and responds to brand impersonation, phishing scams, dark web mentions, threat intel vulnerabilities, and more. This segment is sponsored by Axur. Visit https://securityweekly.com/axurrsac to learn more about them! Segment Resources: https://www.axur.com/en-us/partners https://www.axur.com/en-us/outsourced-takedown https://www.axur.com/polaris/home Vendors, sales channels, partners and other kinds of third parties are essential to most businesses. Ensuring that the information security risks of those other companies don't impact your own is the remit of Third Party Cyber Risk Management (TPCRM) teams. It is increasingly evident, however, that the existing practices and tools are not up to the challenge. They make the process even more adversarial than it needs to be, are focused on risk transfer and/or acceptance rather than reduction; are based on limited and low quality signals; and are often excruciatingly manual. We can do better as an industry, and in this conversation we are going to explore a new paradigm for TPCRM and its advantages for third and first parties. Segment Resources: Alice in Supply Chains is a monthly marketing-free newsletter with curated news and commentary on TPCRM: https://www.linkedin.com/newsletters/alice-in-supply-chains-6976104448523677696/ This segment is sponsored by Tenchi Security. Visit https://securityweekly.com/tenchirsac to learn more about them! Show Notes: https://securityweekly.com/vault-esw-10

Paul's Security Weekly TV
Achieving Cyber Resilience, External Cybersecurity & Risk Reduction - Margarita Barrero, Andy Grolnick, Alexandre Sieira - ESW Vault

Paul's Security Weekly TV

Play Episode Listen Later May 31, 2024 48:15


Organizations today are overwhelmed with the sheer magnitude of potential cybersecurity threats and there is plenty of vendor buzz around AI in Security products, but what is the reality? Threat detection and incident response (TDIR) strategy and execution have never been more critical and are essential in maintaining cyber resilience and strengthening the security posture of every organization. TDIR aims to identify potential threats and respond before they can impact a business. A layered defense focuses on identifying threat activity, prioritizing investigations, and measuring risk. As a result, organizations can take the appropriate threat mitigation steps. These security strategies and protocols signify a step forward with a TDIR strategy where everyone from the CISO to the security analyst wins. This segment is sponsored by Graylog. Visit https://securityweekly.com/graylogrsac to learn more about them! Axur is a cost-effective external cybersecurity solution that empowers security teams to handle threats beyond the perimeter. Our platform detects, inspects, and responds to brand impersonation, phishing scams, dark web mentions, threat intel vulnerabilities, and more. This segment is sponsored by Axur. Visit https://securityweekly.com/axurrsac to learn more about them! Segment Resources: https://www.axur.com/en-us/partners https://www.axur.com/en-us/outsourced-takedown https://www.axur.com/polaris/home Vendors, sales channels, partners and other kinds of third parties are essential to most businesses. Ensuring that the information security risks of those other companies don't impact your own is the remit of Third Party Cyber Risk Management (TPCRM) teams. It is increasingly evident, however, that the existing practices and tools are not up to the challenge. They make the process even more adversarial than it needs to be, are focused on risk transfer and/or acceptance rather than reduction; are based on limited and low quality signals; and are often excruciatingly manual. We can do better as an industry, and in this conversation we are going to explore a new paradigm for TPCRM and its advantages for third and first parties. Segment Resources: Alice in Supply Chains is a monthly marketing-free newsletter with curated news and commentary on TPCRM: https://www.linkedin.com/newsletters/alice-in-supply-chains-6976104448523677696/ This segment is sponsored by Tenchi Security. Visit https://securityweekly.com/tenchirsac to learn more about them! Show Notes: https://securityweekly.com/vault-esw-10

Enterprise Security Weekly (Video)
Achieving Cyber Resilience, External Cybersecurity & Risk Reduction - Margarita Barrero, Andy Grolnick, Alexandre Sieira - ESW Vault

Enterprise Security Weekly (Video)

Play Episode Listen Later May 31, 2024 48:15


Organizations today are overwhelmed with the sheer magnitude of potential cybersecurity threats and there is plenty of vendor buzz around AI in Security products, but what is the reality? Threat detection and incident response (TDIR) strategy and execution have never been more critical and are essential in maintaining cyber resilience and strengthening the security posture of every organization. TDIR aims to identify potential threats and respond before they can impact a business. A layered defense focuses on identifying threat activity, prioritizing investigations, and measuring risk. As a result, organizations can take the appropriate threat mitigation steps. These security strategies and protocols signify a step forward with a TDIR strategy where everyone from the CISO to the security analyst wins. This segment is sponsored by Graylog. Visit https://securityweekly.com/graylogrsac to learn more about them! Axur is a cost-effective external cybersecurity solution that empowers security teams to handle threats beyond the perimeter. Our platform detects, inspects, and responds to brand impersonation, phishing scams, dark web mentions, threat intel vulnerabilities, and more. This segment is sponsored by Axur. Visit https://securityweekly.com/axurrsac to learn more about them! Segment Resources: https://www.axur.com/en-us/partners https://www.axur.com/en-us/outsourced-takedown https://www.axur.com/polaris/home Vendors, sales channels, partners and other kinds of third parties are essential to most businesses. Ensuring that the information security risks of those other companies don't impact your own is the remit of Third Party Cyber Risk Management (TPCRM) teams. It is increasingly evident, however, that the existing practices and tools are not up to the challenge. They make the process even more adversarial than it needs to be, are focused on risk transfer and/or acceptance rather than reduction; are based on limited and low quality signals; and are often excruciatingly manual. We can do better as an industry, and in this conversation we are going to explore a new paradigm for TPCRM and its advantages for third and first parties. Segment Resources: Alice in Supply Chains is a monthly marketing-free newsletter with curated news and commentary on TPCRM: https://www.linkedin.com/newsletters/alice-in-supply-chains-6976104448523677696/ This segment is sponsored by Tenchi Security. Visit https://securityweekly.com/tenchirsac to learn more about them! Show Notes: https://securityweekly.com/vault-esw-10

Paul's Security Weekly
Preparation: The Less Shiny Side of Incident Response - Joe Gross - ESW #360

Paul's Security Weekly

Play Episode Listen Later May 3, 2024 117:07


It's the most boring part of incident response. Skip it at your peril, however. In this interview, we'll talk to Joe Gross about why preparing for incident response is so important. There's SO MUCH to do, we'll spend some time breaking down the different tasks you need to complete long before an incident occurs. Resources 5 Best Practices for Building a Cyber Incident Response Plan This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about them!   It's the week before RSA and the news is PACKED. Everyone is trying to get their RSA announcements out all at once. We've got announcements about funding, acquisitions, partnerships, new companies, new products, new features... To make things MORE challenging, everyone is also putting out their big annual reports, like Verizon's DBIR and Mandiant's M-Trends! Finally, we've got some great essays that are worth putting on your reading list, including a particularly fun take on the Verizon DBIR by Kelly Shortridge. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-360

Paul's Security Weekly TV
Preparation: The Less Shiny Side of Incident Response - Joe Gross - ESW #360

Paul's Security Weekly TV

Play Episode Listen Later May 3, 2024 50:34


It's the most boring part of incident response. Skip it at your peril, however. In this interview, we'll talk to Joe Gross about why preparing for incident response is so important. There's SO MUCH to do, we'll spend some time breaking down the different tasks you need to complete long before an incident occurs. Resources 5 Best Practices for Building a Cyber Incident Response Plan This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about them! Show Notes: https://securityweekly.com/esw-360

Enterprise Security Weekly (Audio)
Preparation: The Less Shiny Side of Incident Response - Joe Gross - ESW #360

Enterprise Security Weekly (Audio)

Play Episode Listen Later May 2, 2024 117:07


It's the most boring part of incident response. Skip it at your peril, however. In this interview, we'll talk to Joe Gross about why preparing for incident response is so important. There's SO MUCH to do, we'll spend some time breaking down the different tasks you need to complete long before an incident occurs. Resources 5 Best Practices for Building a Cyber Incident Response Plan This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about them!   It's the week before RSA and the news is PACKED. Everyone is trying to get their RSA announcements out all at once. We've got announcements about funding, acquisitions, partnerships, new companies, new products, new features... To make things MORE challenging, everyone is also putting out their big annual reports, like Verizon's DBIR and Mandiant's M-Trends! Finally, we've got some great essays that are worth putting on your reading list, including a particularly fun take on the Verizon DBIR by Kelly Shortridge. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-360

Enterprise Security Weekly (Video)
Preparation: The Less Shiny Side of Incident Response - Joe Gross - ESW #360

Enterprise Security Weekly (Video)

Play Episode Listen Later May 2, 2024 50:34


It's the most boring part of incident response. Skip it at your peril, however. In this interview, we'll talk to Joe Gross about why preparing for incident response is so important. There's SO MUCH to do, we'll spend some time breaking down the different tasks you need to complete long before an incident occurs. Resources 5 Best Practices for Building a Cyber Incident Response Plan This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about them! Show Notes: https://securityweekly.com/esw-360

Paul's Security Weekly TV
Top 5 Myths About API Security and What to Do Instead - Robert Dickinson - ESW #354

Paul's Security Weekly TV

Play Episode Listen Later Mar 25, 2024 49:14


While awareness and attention towards cybersecurity are on the rise, some popular and persistent myths about cybersecurity have almost become threats themselves. API security requires a modern understanding of the threat landscape, with the context that most API providers desire to be more open and accessible to all. We will debunk the 5 worst myths about protecting your APIs. Segment Resources: API Security Basics - Everything You Need to Know Graylog API Security - Gain Visibility & Control Over Your API Attack Surface This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about API security! Show Notes: https://securityweekly.com/esw-354

Enterprise Security Weekly (Video)
Top 5 Myths About API Security and What to Do Instead - Robert Dickinson - ESW #354

Enterprise Security Weekly (Video)

Play Episode Listen Later Mar 25, 2024 49:14


While awareness and attention towards cybersecurity are on the rise, some popular and persistent myths about cybersecurity have almost become threats themselves. API security requires a modern understanding of the threat landscape, with the context that most API providers desire to be more open and accessible to all. We will debunk the 5 worst myths about protecting your APIs. Segment Resources: API Security Basics - Everything You Need to Know Graylog API Security - Gain Visibility & Control Over Your API Attack Surface This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about API security! Show Notes: https://securityweekly.com/esw-354

Paul's Security Weekly
Top 5 Myths About API Security and What to Do Instead - Robert Dickinson - ESW #354

Paul's Security Weekly

Play Episode Listen Later Mar 22, 2024 105:52


While awareness and attention towards cybersecurity are on the rise, some popular and persistent myths about cybersecurity have almost become threats themselves. API security requires a modern understanding of the threat landscape, with the context that most API providers desire to be more open and accessible to all. We will debunk the 5 worst myths about protecting your APIs. Segment Resources: API Security Basics - Everything You Need to Know Graylog API Security - Gain Visibility & Control Over Your API Attack Surface This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about API security! In the enterprise security news, Lots of funding news, including: - Nozomi Networks Raises $100 Million to Expand Industrial Cybersecurity Business - BigID Raises $60 Million at $1 Billion Valuation - J.P. Morgan Growth Leads $39 Million Investment in Eye Security - CyberSaint raises $21 million to accelerate market expansion Zscaler Acquires Avalor for $350 Million Cisco completes $28 bn acquisition of cybersecurity firm Splunk Airbus Calls Off Planned Acquisition of Atos Cybersecurity Group Cybersecurity firm Cato Networks hires banks for 2025 IPO, sources say Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-354

Enterprise Security Weekly (Audio)
Top 5 Myths About API Security and What to Do Instead - Robert Dickinson - ESW #354

Enterprise Security Weekly (Audio)

Play Episode Listen Later Mar 22, 2024 105:52


While awareness and attention towards cybersecurity are on the rise, some popular and persistent myths about cybersecurity have almost become threats themselves. API security requires a modern understanding of the threat landscape, with the context that most API providers desire to be more open and accessible to all. We will debunk the 5 worst myths about protecting your APIs. Segment Resources: API Security Basics - Everything You Need to Know Graylog API Security - Gain Visibility & Control Over Your API Attack Surface This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about API security! In the enterprise security news, Lots of funding news, including: - Nozomi Networks Raises $100 Million to Expand Industrial Cybersecurity Business - BigID Raises $60 Million at $1 Billion Valuation - J.P. Morgan Growth Leads $39 Million Investment in Eye Security - CyberSaint raises $21 million to accelerate market expansion Zscaler Acquires Avalor for $350 Million Cisco completes $28 bn acquisition of cybersecurity firm Splunk Airbus Calls Off Planned Acquisition of Atos Cybersecurity Group Cybersecurity firm Cato Networks hires banks for 2025 IPO, sources say Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-354

Paul's Security Weekly TV
Top 5 Myths About API Security and What to Do Instead - Robert Dickinson - ESW #354

Paul's Security Weekly TV

Play Episode Listen Later Mar 22, 2024 49:14


While awareness and attention towards cybersecurity are on the rise, some popular and persistent myths about cybersecurity have almost become threats themselves. API security requires a modern understanding of the threat landscape, with the context that most API providers desire to be more open and accessible to all. We will debunk the 5 worst myths about protecting your APIs. Segment Resources: API Security Basics - Everything You Need to Know Graylog API Security - Gain Visibility & Control Over Your API Attack Surface This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about API security! Show Notes: https://securityweekly.com/esw-354

That Tech Pod
Should You Hire a Tech Therapist? With Joe Gross, Director of Solution Engineering at Graylog

That Tech Pod

Play Episode Listen Later Mar 5, 2024 29:32


Today Kevin and Laura chat with Joe Gross about the cross over of sales and tech. We discuss the role of a tech therapist, a sales engineer, the power of a 10 minute demo, the difference between "pizza tech" and "people tech" people, convenient truths versus outright lies, the first 5 people you should hire and so much more! Joe Gross is the Director of Solutions Engineering at Graylog. Joe is a problem-solver and communicator, relying on his more than 10 years of security and IT expertise to understand and devise solutions to help customers overcome their cybersecurity and logging challenges. Joe also manages Graylog Open, a large interactive online community dedicated to increasing and sharing IT and security knowledge to solve real world problems. 

The Cybersecurity Defenders Podcast
#101 - WiFi attacks and defense with Lennart Koopman, Founder of the Nzyme Network Defense System

The Cybersecurity Defenders Podcast

Play Episode Listen Later Feb 13, 2024 59:12


In this episode of The Cybersecurity Defenders Podcast, we take a close look at WiFi attack methods, and the defenses to them, with Lennart Koopman, Founder of the Nzyme Network Defense System.Lennart Koopman, a tech enthusiast originally from Germany, now calling Houston, TX home. He began coding at a young age and chose to forgo formal education, diving straight into the world of computers after high school.Lennart's career path led him through various roles, from assisting in a hospital's IT helpdesk to web development and eventually joining a startup. In 2009, he launched the Graylog log management system as a side project, marking his entry into the tech scene.Currently, Lennart is focused on his latest endeavor: The nzyme Network Defense System, demonstrating his ongoing commitment to technological advancement.The WiFiPhisher Github account can be found here. Lennart's talk at MSS CTRL (LINK) can be found here.The Nzyme Network Defense System website can be found here. Lennart can be found in Twitter/X here.

Cyber Pro Podcast
#265 | Joe Gross | Director of Solutions Engineering | Graylog, Inc.

Cyber Pro Podcast

Play Episode Listen Later May 24, 2023 11:58


Joe discusses log management and solution engineering. He also elaborates on what are you trying to accomplish & how can your IT team achieve that? He shares what turned him towards blue teaming. He talks about the risk management of our critical infrastructure, and how cybersecurity can change everything about how we live our daily lives. He shares how his career has been directed towards logs over the last 5+ years. Joe stresses the importance of forethought about what you are building into things. We get focussed on what we can get done, and as fast as possible, but unless you can protect it, it is all for naught. A good vendor will tell you how to use yours logs correctly.    Connect with Joe: https://www.linkedin.com/in/joe-gross-se/ Visit Graylog, Inc.: https://www.graylog.org/   Visit Shortarms website: https://www.shortarmsolutions.com/    You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions  YouTube: https://www.youtube.com/@shortarmsolutions   Twitter: https://twitter.com/ShortArmSAS

Cyber Pro Podcast
#265 | Joe Gross | Director of Solutions Engineering | Graylog, Inc.

Cyber Pro Podcast

Play Episode Listen Later May 24, 2023 11:58


Joe discusses log management and solution engineering. He also elaborates on what are you trying to accomplish & how can your IT team achieve that? He shares what turned him towards blue teaming. He talks about the risk management of our critical infrastructure, and how cybersecurity can change everything about how we live our daily lives. He shares how his career has been directed towards logs over the last 5+ years. Joe stresses the importance of forethought about what you are building into things. We get focussed on what we can get done, and as fast as possible, but unless you can protect it, it is all for naught. A good vendor will tell you how to use yours logs correctly.    Connect with Joe: https://www.linkedin.com/in/joe-gross-se/ Visit Graylog, Inc.: https://www.graylog.org/   Visit Shortarms website: https://www.shortarmsolutions.com/    You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions  YouTube: https://www.youtube.com/@shortarmsolutions   Twitter: https://twitter.com/ShortArmSAS

Risk Management Show
Power of a Cybersecurity Community with Joe Gross

Risk Management Show

Play Episode Listen Later May 11, 2023 14:54


In this episode, our guest Joe shares his insights on the importance of being part of an (online) community within your niche, specifically in the field of cybersecurity. He also discusses how to build such a community, even within your own company, and emphasizes the significance of active engagement. Joe Gross is the Director of Solution Engineering at Graylog, Inc. Graylog is an award-winning centralized log management and SIEM (Security Information Event Management) solution that enables fast and efficient log analysis in the areas of security, compliance, operations, and DevOps. If you want to be our guest, or you know some one who would be a great guest on our show, just send your email to info@globalriskconsult.com with a subject line “Global Risk Community Show” and give a brief explanation of what topic you would like to to talk about and we will be in touch with you asap.

Secure Talk - Cybersecurity
How Online Communities Can Facilitate Information Sharing to Solve IT & Security Challenges

Secure Talk - Cybersecurity

Play Episode Listen Later Mar 28, 2023 47:55


Joe Gross is the Director of Solutions Engineering at Graylog. Joe talks about the development of Graylog's online community and best practices related to growing and increasing engagement with online communities. Joe also spends some time comparing the different types of log management platforms, their feature sets and pricing models. Graylog https://www.graylog.org/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/

The Cybersecurity Defenders Podcast
#10 - Simply Cyber Report for December 14. Plus a conversation with several Open Source cybersecurity founders.

The Cybersecurity Defenders Podcast

Play Episode Listen Later Dec 14, 2022 61:02


The Simply Cyber Report for December 14, 2022.Go-based malware named Zerobot in the wild. Android malware dubbed "Zombinder" a Just-in-time Trojan style malware. Iranian based APT, has been pushing hard with remote administration tooling.A roundtable conversation with several Open Source cybersecurity founders. During the conversation we discuss the complexities of open-source as it relates to cybersecurity, the effects it has on the industry, funding models, what inspired these projects, how they came to be, how they are trying to grow, and any lessons - good or bad - they have learned along the way.The panelist include:Zach Wasserman from osqueryLennart Koopmann from Graylog, Inc.Peter Manev from SuricataAnd we acknowledge some heavy audio compression during the roundtable conversation. We will be employing some new recording technology for future group conversations.As always, we would love to hear from you. Questions, feedback and ideas can be directed to defenders@limacharlie.ioThe Cybersecurity Defenders Podcast: a show about cybersecurity and the people that defend the internet.

Brilliance Security Magazine Podcast
How to Move Cybersecurity From a Cost Center to a Revenue Enabler

Brilliance Security Magazine Podcast

Play Episode Listen Later Jun 20, 2022 20:18


In Episode S4E12, our guest is Jim Nitterauer, Director of Information Security at Graylog. In a fun and informative conversation, BSM's Steve Bowcut and Jim discuss how organizations can move cybersecurity from a cost center to a revenue enabler. Steve asks Jim to: Discuss some of the costs organizations face trying to protect their systems, infrastructure, and data. Explain why security isn't typically viewed as a revenue enabler like other software costs often are. Tell us why and how security can increase revenue. Talk specifically about the costs that log management can reduce or eliminate. About our Guest Jim Nitterauer and his teams are responsible for IT Services, Security, and Compliance across the Graylog organization. He holds CISSP and CISM certifications in addition to a Bachelor of Science degree with a major in biology from Ursinus College and a Master of Science degree with a major in microbiology from the University of Alabama. He is well-versed in ethical hacking and penetration testing techniques and has been involved in technology for more than 25 years. Listen to this week's episode to learn more about how security can enable revenue.

Colorado = Security Podcast
216 - 6/28 - Identiverse Interview with Mike Benjamin & Alex Weinert

Colorado = Security Podcast

Play Episode Listen Later Jun 27, 2021 53:31


Our feature interview this week is a recap of the Identiverse keynote panel with Mike Benjamin (from Lumen), Alex Weinert (from Microsoft) and our own Alex Wood. News from Africa Adventure Consultants, Canoosh, Valyant AI, EverCommerce, GrayLog, VirtualArmour, Phylum, Ping Identity, Red Canary and a lot more! Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week's news: Join the Colorado = Security Slack channel One of the world's top safari operators is based in Denver. Here's how it survived months without revenue. A Colorado family was so into board games, they made their own Denver AI startup steps up amid a growing restaurant labor shortage Denver unicorn sets IPO pricing, could be valued up to $3.46 billion Tech firm led by ex-LogRhythm boss raises $18M Series B funding round Evergreen Services Group to Enter MSSP Market with Agreement to Acquire VirtualArmour Ping Identity Announces the Acquisition of SecuredTouch to Accelerate Identity Fraud Capabilities Phylum Closes $4.5M in Seed Funding and Comes Out of Stealth Mode Ping Identity puts users in control of their identity with New Personal Identity Solution 500 security leaders reveal what worries them most and why Job Openings: CommonSpirit Health - System Vice President - Cybersecurity Transformation S&P Global - Director, Data Security Architecture Poly - Sr. Manager of Enterprise Security Cleerly - Senior Manager Information Security Denver Center for the Performing Arts - Information Security Manager University of Colorado - Security Operations Manager Cushman & Wakefield - Security Strategy and Operations Senior Manager State of Colorado - Manager of Identity and Access Management (IAM) Colorado School of Mines - Security Analyst Incident Response Berkshire Hathaway Homestate Companies - Senior Cyber Security Engineer Upcoming Events: This Week and Next: Cyber Mountain C.Springs - Hybrid First Friday - 7/9 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0

In Before The Lock

How to drive product enhancements and innovation through crowdsourced ideation programs with your community. Community Industry News Erin O’Neill joined Funnel IQ as Community Manager Diana Morgan joined Copy.ai as Head of Community Lauren Lee joined Puppetize as Community Director Molli Aronce joined Facebook Reality Labs as Community Manager Kristina Prickett joined Moxie as Senior Community Strategist  Eric Steig joined Zilliz as Director of Open Source Communities Pattie Kettle joined Xactly Corp as Community Manager Luiza Drachicean was promoted to Global Advocacy Community Manager at UIPath David Sciuto joined Graylog as Senior Principal Community Manager Isaiah Brown joined Houzz as Pro Community Marketing Manager Ideation: Jamf implements community ideas in every release Dell Ideastorm Starbucks Ideas Shawna Wolverton Purple Pony Aftershow: Tim Tams Sponsored by: The 2021 Community Club Summit is the virtual event for builders and leaders in community-led companies. Join for free on May 11-13 for three days. Higher Logic’s new community for products will help B2B companies improve customer experience and success, tailor marketing efforts, build brand advocates, and scale support efforts.

Paul's Security Weekly (Podcast-Only)
The Hunt for Red October - PSW #690

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later Apr 9, 2021 198:41


This week, Lennart Koopmann, the CTO of Graylog, Inc, joins us for an interview to talk about Nzyme, a Free and Open WiFi Defense System. Then, Dutch Schwartz, Principal Security Specialist at Amazon Web Services, joins us for a discussion on the Lessons Learned When Migrating from On Prem to Cloud! In the Security News, Polish blogger sued after revealing security issue in encrypted messenger, The Facebook dump and Have I Been Pwned, Child tweets gibberish from a highly sensitive Twitter account, LinkedIn and more_eggs, APTs targeting Fortinet, SAP Applications Are Under Active Attack again, Is your dishwasher trying to kill you?, Ubiquiti All But Confirms Breach Response Iniquity, Cyber Threat Analysis, 11 Useful Security Tips for AWS and other stuff too, Signal Adds Cryptocurrency Support and Not everyone is a fan, Zoom 0-click exploit, when firmware attacks, attackers blowing up Discord! Register for Joff's Fun Regular Expressions class here: https://bit.ly/JoffReLife   Show Notes: https://securityweekly.com/psw690 Segment Resources: https://www.nzyme.org/   Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Paul's Security Weekly
The Hunt for Red October - PSW #690

Paul's Security Weekly

Play Episode Listen Later Apr 9, 2021 198:41


This week, Lennart Koopmann, the CTO of Graylog, Inc, joins us for an interview to talk about Nzyme, a Free and Open WiFi Defense System. Then, Dutch Schwartz, Principal Security Specialist at Amazon Web Services, joins us for a discussion on the Lessons Learned When Migrating from On Prem to Cloud! In the Security News, Polish blogger sued after revealing security issue in encrypted messenger, The Facebook dump and Have I Been Pwned, Child tweets gibberish from a highly sensitive Twitter account, LinkedIn and more_eggs, APTs targeting Fortinet, SAP Applications Are Under Active Attack again, Is your dishwasher trying to kill you?, Ubiquiti All But Confirms Breach Response Iniquity, Cyber Threat Analysis, 11 Useful Security Tips for AWS and other stuff too, Signal Adds Cryptocurrency Support and Not everyone is a fan, Zoom 0-click exploit, when firmware attacks, attackers blowing up Discord!   Show Notes: https://securityweekly.com/psw690 Segment Resources: https://www.nzyme.org/   Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Colorado = Security Podcast
187 - 11/16 - Lucia Milica, Global Resident CISO at Proofpoint

Colorado = Security Podcast

Play Episode Listen Later Nov 17, 2020 59:43


Lucia Milica, Global Resident CISO at Proofpoint is our feature guest this week. News from Handoff, Demoflow, Josh.ai, Vertafore, Graylog, JumpCloud, Ping Identity, Coalfire and a lot more! Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week’s news: Join the Colorado = Security Slack channel Denver alcohol delivery startup acquired 18 months after launch Denver's Demoflow has created a collaborative platform for virtual sales presentations Denver home automation startup Josh.ai releases new, smaller products Three Colorado cities named ‘Top Tech Towns’ in the U.S. for 2020 Human error leads to 27.7 million people impacted in Vertafore 'data event' Graylog Appoints Andy Grolnick Chief Executive Officer Denver-based JumpCloud lands $75M funding round, plans to hire 500 Securing Cloud Access and DevOps with Ping & Centrify Fight Ransomware with Defense in Depth Cloud tech first floor recommendations Job Openings: Ping Identity - GRC Program Manager - FedRAMP Ping Identity - Manager of GRC Ping Identity - Product Security Engineer LogRhythm - Deputy CISO Americas BofA - Network Detection and Response Analyst Base-2 Solutions - Cybersecurity Systems Engineer Level 4 Honeywell - Senior Cyber Security Analyst Western Union - Leader - Cyber Security Encryption Affirm - Senior Director, Internal Controls Optiv - Senior Manager, Cybersecurity Upcoming Events: This Week and Next: Peak Cyber Symposium - 11/16-19 CSA - November Virtual Meeting - 11/17 ISC2 Pikes Peak - November Chapter Meeting - 11/18 Splunk Meetup - Not Your Grandma’s Ransomware: The Evolution of Crimeware and the Current Risks - 11/18 ISSA C.Springs - November Online Meeting - 11/19 ISACA Denver - November Chapter Meeting - 11/19 DC303 - November Meeting - 11/27 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0

Daily Dev
ep010

Daily Dev

Play Episode Listen Later Apr 17, 2020 42:49


Не проследили за балансом микрофонов, поэтому Боря в этом выпуске звучал тише, чем обычно. Приносим извенения за неудобства. Поговорили про логгирование в web-сервисах. - пакет `log` стандартной библиотеки; - написание своих кастомных логеров; - упомянули наше решение [gluent-bit][1], которое мы используем для трансляции логов в Graylog; - [logrus][2] в ~20 раз медленнее [zap][3]; - немного упомянули json-экстрактор Graylog; - уровни логирования: DEBUG, INFO, WARN, ERROR, FATAL; - особенности [zap][3]: - поддержка уровней логирования; - sampling для дедупликации потока логов; - не использует рефлексию и стандартный `json` пакет: работает через `append`; - `SugaredLogger` и `Logger`; - нет ротации логов. - ротация логов через [lumberjack][4] - что имеет смысл логировать, а что выносить в мониторинг; - `Reference-Id` для идентификации request-response и связанных операций; - отказ от логирования запросов, не изменяющих состояние системы; - унификация логов. [1]: https://github.com/ostretsov/gluent-bit [2]: https://github.com/sirupsen/logrus [3]: https://github.com/uber-go/zap [4]: https://godoc.org/gopkg.in/natefinch/lumberjack.v2

Björeman // Melin
Avsnitt 178: RSS är roligt igen

Björeman // Melin

Play Episode Listen Later Sep 7, 2019 68:54


Fredrik rapporterar från en säker plats i Spanien Nyheter i Icloud får anstå Veckans oväntade VR-mys - Fredrik surfar på nätet i sin Oculus quest Jockes mage bråkar (dagen efter inspelning blev han inlagd på sjukhus) Jocke tittar på Nginx på CentOS7, kompilerar Haproxy på CentOS 7, databaskluster med MariaDB och Galera, med mera 2,5 timmar snack med John Carmack, någon? Unix fyller 50 - episk (och lite för kort) artikel på Ars technica iPhone-event nästa vecka Fredrik har handlat hus. Jocke berättar om oväntade utgifter och strulande Macar. Borde inte datorer kunna vara lite mer spännande? NetNewsWire en vecka in - RSS är roligt igen! (grubers senaste avsnitt med Brent Simmons är svinbra. Denna lista är också rolig där gänget bakom Netnewswire funderar på vilken kritik de skulle få när de väl släppt applikationen The web we lost, högeligen aktuell artikel från 2012 Fredrik funderar på att bygga mycket liten Mastodon-app, Jocke är för Länkar Sitges Full stack fest Brainshare Nat Friedman Miguel de Icaza Midnight commander Charlie Christiansen Arne Anka Bombad och sänkt Firefox reality Oculus quest Instapaper Jockes mage är verkligen i olag Galera Puppet Ansible Graylog John Carmack The Joe Rogan experience Joe Rogan pratar med John Carmack Ars artikel om Unix Roblox Fornite For all mankind The morning show Netnewswire Brent Simmons på The talk show) The web we lost Whalebird Thedesk Två andra mastodonklienter för Mac: Hyperspace och Sax Day of the programmer Två nördar - en podcast. Fredrik Björeman och Joacim Melin diskuterar allt som gör livet värt att leva. Fullständig avsnittsinformation finns här: https://www.bjoremanmelin.se/podcast/avsnitt-178-rss-ar-roligt-igen.html.

Security In Five Podcast
Episode 410 - Tools, Tips And Tricks - Graylog, Open Source SIEM

Security In Five Podcast

Play Episode Listen Later Jan 18, 2019 7:14


This week's tools, tips and tricks episode is about an open source Security Information Event Management (SIEM) system. GrayLog can enable your home network or business to begin collecting and aggregating system logs fast and easier than any other SIEM I have used. Within a few hours I was up and collecting more data, alerting on events and getting visibility into behaviors of my systems. This episode goes into the details and talk about why every single business needs to have a SIEM in their network and GrayLog is a viable option... and it's free.  GrayLog website. NXLog Community Edition Windows Log Collector. Don't forget to check up in Binaryblogger.com on setting up GrayLog. Be aware, be safe. Don't forget to subscribe to the Security In Five Newsletter. Send in your Security Horror Stories - bblogger@protonmail.com —————— Where you can find Binary Blogger —————— Security In Five Facebook Page Podcast RSS Twitter @binaryblogger YouTube, Stitcher Email - contactme@binaryblogger.com

Getting Into Infosec
Clay Wells - From SysAdmin to Security Architect to Con Organizer!

Getting Into Infosec

Play Episode Listen Later Nov 27, 2018 38:27


Clay Wells ... Security Architect, Musician, Defcon Blue Team Village Co-Organizer, and organizer of the first annual WOPR Summit. Clay shares some really insightful tips on making it Information Security, as well as a really interesting war story from recently. WOPR Summit is March 1st, 2019 in Atlantic City! Bio: Living in kernel/userland since Red Hat 4.0 Colgate. Work life has primarily been in Academia and has included programming, system administration, and information security. He's a point of contact for the DC215 group and one of the coordinators for the Blue Team Village at DEF CON. He also creates unofficial CTF challenges for local hacker cons and is organizer for the first annual WOPR Summit this March 2019 in Atlantic City. Quotes: "My heart was racing... that was a huge rush and that's when I was like yea... Blue side F*** rocks!!" "Take a holistic approach to InfoSec, dive into the culture, different cons, music, people...volunteer, get out, get involved... learn a little about everything, then find what really interests you... and go for it!" "It's great to apt-get stuff... but try compiling a custom linux kernel." "I'm a strong believer in embracing that creative side." "It [Blue Team] certainly hasn't been the sexiest infosec job to have... yes defense is what people want... there's a lot defense work out there." Links: Clay Wells on Twitter: https://twitter.com/ttheveii0x Clay Wells on LinkedIN: https://www.linkedin.com/in/clayball/ Clay Wells Blog: http://www.cwells.org/ WOPR Summit 2019 WOPR Summit Sponsorhip Prospectus DEF CON Blue Team Village Opensoc by Recon Infosec BsidesDC Graylog Kibana H.O.P.E Conference No Starch Press Outro Music by Clay

LPL-Mind Developer Podcast
003: Tipps und Tricks für dein Developerleben

LPL-Mind Developer Podcast

Play Episode Listen Later Oct 28, 2018 14:19


- Windows Subsystems zur Einbindung von z.B. ubuntu für ein Cross-Developing. https://docs.microsoft.com/en-us/windows/wsl/about - Erweiterte Suchfunktion von Notpad++ und reguläre ausdrücke zu Suche in Logfiles. - Logging-Format und Standards vor dem Beginn deiner Tätigkeit überdenken und ggf. ein Loggingsystem wie Graylog verwenden. - Nutzen von Frameworks oder Libraries zur Teillösung von schon bekannten Problemen. Niemand braucht das Rad neu erfinden. Sende deine Themenvorschläge und Kommentare an anfrage@lpl-mind.de

Beyond Pageviews – termfrequenz: Online Marketing & SEO Podcasts

Back to the Roots dank DSGVO: Wir befassen uns heute in der ersten Sendung nach Trackageddon mit Logfiles und was man damit so alles typischerweise anfangen kann. Was steht drin, wo findet man sie und wie wertet man die Daten aus?

Laravel News Podcast
Laravel releases, cookbooks, and signed routes

Laravel News Podcast

Play Episode Listen Later Apr 3, 2018 49:58


Jake and Michael return to discuss the latest Laravel releases, community projects, and upcoming changes.

Graylog
Ep 2: Guest Eric Capuano

Graylog

Play Episode Listen Later Feb 23, 2018 35:53


Guest Eric Capuano(twitter.com/eric_capuano) shares his experiences using Graylog. Links from the show: Graylog's ElasticON Party Invite: www.graylog.org/graylog-party Graylog Delimited File Output Plugin by Richard Westmoreland: https://github.com/rswestmoreland/graylog-delimited-file-output-plugin Sysinternals Sysmon suspicious activity guide: https://blogs.technet.microsoft.com/motiba/2017/12/07/sysinternals-sysmon-suspicious-activity-guide/ Graylog Sysmon by ionstorm: https://github.com/ion-storm/Graylog_Sysmon fan·fare - noun a short ceremonial tune or flourish played on brass instruments, typically to introduce something or someone important If you would like to be a guest on the next episode, you can email taylor@graylog.com. Thanks!

capuano graylog
Graylog
EP 1: Graylog v2.4.0-beta.1 and sneak-peek of Graylog v3.0

Graylog

Play Episode Listen Later Oct 25, 2017 29:43


Bernd Ahlers, Lennart Koopmann, and Taylor Rhoades discuss the features in Graylog v2.4.0-beta.1, give a sneak-peek of Graylog 3.0, talk bug-fixes in Graylog v2.3.2 and the open-source tool, Nzyme. Graylog 2.4.0-beta.1 Blog: https://www.graylog.org/blog/103-announcing-graylog-v2-4-0-beta-1 Lennart's talk at DerbyCon - Love is in the Air: DFIR and IDS for WiFi Networks https://www.youtube.com/watch?v=bi12FkXghmo Special shout-out to our community members for their pull requests. Bill Murrin - https://github.com/billmurrin (Dashboard widget improvements) https://github.com/gaspardpetit (SSO plugin improvements) Greg - https://github.com/supahgreg (Pipeline processor improvements) https://github.com/silenceper (LDAP improvements) Marc Ruiz - https://github.com/radykal-com (AWS plugin improvements) If you'd like to be a special guest on our podcast, reach out to us on Twitter (graylog2) or email taylor@graylog.com. Thanks!

DevOps Дефлопе подкаст
022 - Возвращение из отпуска

DevOps Дефлопе подкаст

Play Episode Listen Later Aug 12, 2015 36:37


Новости Как Атлас использует Волт Monitoring scape и постер New Relic’s Docker Monitoring Switching user database on a running system Mesos Sandbox Using Docker Compose RunC Automatically Cleaning Unused Docker Images Using Consul and CloudSlang ну и вообще CloudSlang Periodic table of devops tools Graylog docker native integration Состояние DevOps от PuppetLab Мультфилм «Время Приключений»