Evaluate your SIEM
Get the guidePosts by Sumo Logic
Blog
How using Cloud SIEM dashboards and metrics for daily standups improves SOC efficiency
Blog
Sumo Logic celebrates Earth Day 2022 with Planeteer-led Earth Week
Blog
How to monitor RabbitMQ logs and metrics with Sumo Logic
Blog
How to monitor ActiveMQ logs and metrics
Blog
How to monitor Amazon Kinesis
Blog
Monitoring your AWS environment for vulnerabilities and threat detection
Blog
Accelerating software delivery through observability at two very different organizations
Blog
How teams are breaking down data silos to improve software delivery
Blog
Log4Shell CVE-2021-44228
Blog
Announcing new Sumo Logic AWS security Quick Start integrations
Blog
How to streamline Windows monitoring for better security
Blog
Why and how to monitor AWS EKS
Blog
All you need to know about HAProxy log format
Blog
Announcing New York State Department of Financial Services Attestation
Blog
Monitoring Cassandra vs Redis vs MongoDB
Blog
Building a modern SOC
Blog
Legacy vs. modern cloud SOAR-powered SOC
Blog
How to monitor Cassandra database clusters
Blog
Analyzing Office 365 GCC data with Sumo Logic
Blog
The role of threat hunting in modern security
Blog
Threat hunting with Cloud SIEM
Blog
Introducing new cloud security monitoring & analytics apps
Blog
Introducing Sensu
Blog
What is threat intelligence?
Blog
Case Study: Genesys’ journey to the cloud and DevOps excellence
Blog
SEGA Europe and Sumo Logic: integrating security across clouds
Blog
Automate your SIEM with Sumo Logic in 7 clicks
Blog
Pondering Dogs and Observability
Blog
Creepy or Unjust: The State of Data in the U.S.
Blog
Automated Tech Perpetuates the Digital Poorhouse
Blog
How to analyze IIS logs for better monitoring
Blog
Kubernetes Dashboard
Blog
NGINX Log Analyzer
Blog
Get Started with Kubernetes
Blog
Using Data to Find the Mysterious Centrist Voter
Blog
Can We Rely on Data to Predict the Outcome of the 2020 Election?
Blog
Simplifying log management with logging as a service
Blog
Detecting Windows Persistence
Blog
Rethinking Modern SOC Workflow
Blog
What data types to prioritize in your security information and event management (SIEM)
Blog
Defense in depth: DoublePulsar
Blog
Gaining Visibility Into Edge Computing with Kubernetes & Better Monitoring
Blog
The value of a stolen account. A look at credential stuffing attacks.
Blog
The Difference Between IaaS, Paas, and SaaS
Blog
Profiling "VIP Accounts" Part 2
Blog
Spam In the Browser
Blog
Profiling “VIP Accounts” Part 1
Blog
A New Integration between Sumo Logic and ARIA Cybersecurity Solutions
Blog
Tracking Systems Metrics with collectd
Blog
How to View Logs in Kubectl
Blog
Vagrant vs. Docker: Which Is Better for Software Development?
Blog
NGINX vs Apache
Blog
5 Tips for Preventing Ransomware Attacks
Blog
Serverless Computing for Dummies: AWS vs. Azure vs. GCP
Blog
Serverless Computing Security Tips
Blog
Security Strategies for Mitigating IoT Botnet Threats
Blog
Multi-Cloud Security Myths
Blog
Clearing the Air: What Is Cloud Native?
Blog
What is IoT Security?
Blog
IIS Logs Location
Blog
Best Practices with AWS GuardDuty for Security and Compliance
Blog
What is AWS GuardDuty?
Blog
AWS 101: An Overview of Amazon Web Services
Blog
Building Cross-platform Mobile Apps
Blog