Sumo Logic

Posts by Sumo Logic

Blog

How using Cloud SIEM dashboards and metrics for daily standups improves SOC efficiency

Blog

Monitoring your AWS environment for vulnerabilities and threat detection

Blog

Accelerating software delivery through observability at two very different organizations

Blog

How teams are breaking down data silos to improve software delivery

Blog

Log4Shell CVE-2021-44228

Blog

Announcing new Sumo Logic AWS security Quick Start integrations

Blog

How to streamline Windows monitoring for better security

Blog

Why and how to monitor AWS EKS

Blog

All you need to know about HAProxy log format

Blog

Announcing New York State Department of Financial Services Attestation

Blog

Monitoring Cassandra vs Redis vs MongoDB

Blog

Building a modern SOC

Blog

Legacy vs. modern cloud SOAR-powered SOC

Blog

How to monitor Cassandra database clusters

Blog

Analyzing Office 365 GCC data with Sumo Logic

Blog

The role of threat hunting in modern security

Blog

Threat hunting with Cloud SIEM

Blog

Introducing new cloud security monitoring & analytics apps

Blog

Introducing Sensu

Blog

What is threat intelligence?

Blog

Case Study: Genesys’ journey to the cloud and DevOps excellence

Blog

SEGA Europe and Sumo Logic: integrating security across clouds

Blog

Automate your SIEM with Sumo Logic in 7 clicks

Blog

Pondering Dogs and Observability

Blog

Creepy or Unjust: The State of Data in the U.S.

Blog

Automated Tech Perpetuates the Digital Poorhouse

Blog

How to analyze IIS logs for better monitoring

Blog

Kubernetes Dashboard

Blog

NGINX Log Analyzer

Blog

Get Started with Kubernetes

Blog

Using Data to Find the Mysterious Centrist Voter

Blog

Can We Rely on Data to Predict the Outcome of the 2020 Election?

Blog

Simplifying log management with logging as a service

Blog

Detecting Windows Persistence

Blog

Building Collaborative AI from the Ground Up

Blog

What Data Types to Prioritize in Your SIEM

Blog

Defense in depth: DoublePulsar

Blog

Gaining Visibility Into Edge Computing with Kubernetes & Better Monitoring

Blog

The value of a stolen account. A look at credential stuffing attacks.

Blog

The Difference Between IaaS, Paas, and SaaS

Blog

Profiling "VIP Accounts" Part 2

Blog

Spam In the Browser

Blog

Profiling “VIP Accounts” Part 1

Blog

A New Integration between Sumo Logic and ARIA Cybersecurity Solutions

Blog

Tracking Systems Metrics with collectd

Blog

How to View Logs in Kubectl

Blog

Vagrant vs. Docker: Which Is Better for Software Development?

Blog

NGINX vs Apache - Which Web Server Is Right for You?

Blog

5 Tips for Preventing Ransomware Attacks

Blog

Serverless Computing for Dummies: AWS vs. Azure vs. GCP

Blog

Serverless Computing Security Tips

Blog

Security Strategies for Mitigating IoT Botnet Threats

Blog

Multi-Cloud Security Myths

Blog

Clearing the Air: What Is Cloud Native?

Blog

What is IoT Security?

Blog

Where to Find IIS Log Files

Blog

Best Practices with AWS GuardDuty for Security and Compliance

Blog

What is AWS GuardDuty?

Blog

AWS 101: An Overview of Amazon Web Services

Blog

Building Cross-platform Mobile Apps

Blog

The Importance of Continuous Intelligence on the Future of Full-stack System Management