Enrich Your Graylog with SEKOIA.IO

Enrich Your Graylog with SEKOIA.IO

The Cyber Threat Intelligence (CTI) of SEKOIA.IO includes indicators that are crafted for the special needs of detecting and qualifying both generic and advanced cyber threats. This article shows a simple solution to use the CTI of SEKOIA.IO to enrich a log management...
Introducing SEKOIA.IO: the Intelligence-Driven SaaS SIEM

Introducing SEKOIA.IO: the Intelligence-Driven SaaS SIEM

Organizations around the world are facing multiple and growing cybersecurity challenges: an increase in both number and sophistication of fast-evolving cyber threats; an expanding attack surface; a cybersecurity talent shortage; and a shift to Cloud technologies. When...
Moving your security to the cloud?

Moving your security to the cloud?

Cloud security has been a hot topic in recent years. Every indicator shows a stable growth for the next years, but can companies really move all their security into the cloud? Today’s world is the world of the cloud. According to Gartner, cloud-based security services...
Reduce cyber-risks through automation

Reduce cyber-risks through automation

Reduce cyber-risks through automation According to the Accenture 2019 Cost of Cybercrime Study, released on March 6 2019, on an average the expense of malware attacks for companies was $2.6 million, an 11% year-over-year jump. Accenture also noticed a big rise in the...
How we made deployments safer at SEKOIA.IO

How we made deployments safer at SEKOIA.IO

SEKOIA.IO process almost a billion client events per day. That’s tens of thousands of log entries per second. Every single event has to be analyzed quickly and reliably by our detection pipeline, to detect cyber threats and react as soon as possible. You can imagine...