How to create a single-node Graylog instance and analyze FortiGate logs

Firewall logs provide a wealth of information about a network. They can be used to identify devices, troubleshoot policies, and…

April 13, 2023

SEIMs and Other Forensic Tools Vulnerable to Log4j Exploits

This article was last updated on 2022-01-03. After several Log4j vulnerabilities (known as Log4shell or LogJam in the tech press)…

December 23, 2021