|
Understanding Security Log Analytics vs. SIEM for Midsized Companies Targeted by Cybercriminals
|
Dave Armlin |
2024-07-25 |
1,366 |
--
|
|
Top Security Data Types: Exploring the OCSF Framework
|
David Bunting |
2024-05-02 |
1,595 |
--
|
|
3 Straightforward Pros and Cons of Datadog for Log Analytics
|
Dave Armlin |
2024-01-04 |
1,680 |
--
|
|
How MDR Services Can Optimize Threat Intelligence
|
David Bunting |
2024-08-08 |
1,293 |
--
|
|
AWS vs GCP: Which Cloud Service Logs Can Provide the Most Valuable …
|
David Bunting |
2024-06-06 |
1,726 |
--
|
|
Process, Store and Analyze JSON Data with Ultimate Flexibility
|
Sandro Lima |
2024-03-21 |
1,658 |
--
|
|
How to Get Started with a Security Data Lake
|
David Bunting |
2024-08-29 |
1,431 |
--
|
|
How to Calculate Log Analytics ROI
|
David Bunting |
2024-04-12 |
1,457 |
--
|
|
Innovating Security with Managed Detection & Response (MDR) and ChaosSearch
|
David Bunting |
2024-06-20 |
1,145 |
--
|
|
From Legacy to Future-proof: Transforming Your Enterprise Data Architecture
|
Dave Armlin |
2024-09-05 |
1,892 |
--
|
|
ELK Stack Costs Add Up: Here’s How to Switch
|
David Bunting |
2024-02-01 |
2,489 |
--
|
|
The Top 5 Security Logging Best Practices to Follow Now
|
David Bunting |
2024-07-18 |
1,174 |
--
|
|
6 Threat Detection Challenges for MDRs and How to Overcome Them
|
David Bunting |
2024-08-23 |
1,456 |
--
|
|
Why Organizations are Using Grafana + Loki to Replace Datadog for Log …
|
David Bunting |
2024-04-18 |
2,280 |
--
|
|
How to Quickly Analyze CloudFront Cloud Logs in Amazon S3
|
David Bunting |
2024-07-11 |
1,264 |
--
|
|
6 Gaming Analytics Challenges and How To Solve Them
|
David Bunting |
2024-01-25 |
1,561 |
--
|
|
5 Guiding Principles of Digital Business Observability
|
David Bunting |
2024-01-11 |
1,661 |
--
|
|
Unpacking the Differences between AWS Redshift and AWS Athena
|
Dave Armlin |
2024-03-14 |
1,514 |
--
|
|
Log and Event Analytics on Databricks: Overview and Use Cases
|
David Bunting |
2024-05-30 |
1,765 |
--
|
|
How to Threat Hunt in Amazon Security Lake
|
David Bunting |
2024-04-04 |
999 |
--
|
|
Databricks Data Lakehouse Versus a Data Warehouse: What’s the Difference?
|
David Bunting |
2024-09-12 |
1,413 |
--
|
|
How to Create an S3 Bucket with AWS CLI
|
David Bunting |
2024-05-09 |
2,095 |
--
|
|
Threat Hunting Frameworks and Methodologies: An Introductory Guide
|
Thomas Hazel |
2024-02-08 |
1,603 |
--
|
|
Inside DataOps: 3 Ways DevOps Analytics Can Create Better Products
|
Dave Armlin |
2024-02-29 |
1,365 |
--
|
|
Improving Patch and Vulnerability Management with Proactive Security Analysis
|
David Bunting |
2024-07-01 |
1,635 |
--
|
|
How to Search Your Cloud Data — With No Data Movement
|
David Bunting |
2024-03-28 |
1,226 |
--
|
|
How to use GenAI for database query optimization and natural language analysis
|
David Bunting |
2024-02-16 |
1,144 |
--
|
|
Databases Compared: Databricks vs. Snowflake vs. ChaosSearch vs. Elasticsearch
|
David Bunting |
2024-05-16 |
1,992 |
--
|
|
5 Challenges Querying Data in Databricks + How to Overcome Them
|
David Bunting |
2024-09-19 |
1,569 |
--
|
|
What is the Future of Apache Spark in Big Data Analytics?
|
David Bunting |
2024-07-04 |
1,866 |
--
|
|
How To Use the MITRE ATT&CK Framework
|
Thomas Hazel |
2024-05-24 |
2,284 |
--
|
|
Ultimate Guide to Amazon S3 Data Lake Observability for Security Teams
|
Dave Armlin |
2024-08-15 |
1,731 |
--
|
|
How to Unlock Faster Analytics with Amazon S3 Express One Zone
|
David Bunting |
2024-01-18 |
1,134 |
--
|
|
5 Best Practices for Streaming Analytics with S3 in the AWS Cloud
|
David Bunting |
2024-02-22 |
1,624 |
--
|
|
5 Security Logging and Monitoring Mistakes to Avoid
|
David Bunting |
2024-06-13 |
1,241 |
--
|
|
5 Proactive Security Engineering Techniques for Cloud-Native Teams
|
David Bunting |
2024-03-07 |
1,458 |
--
|
|
The Power of Combining a Modular Security Data Lake with an XDR
|
David Bunting |
2024-08-02 |
1,682 |
--
|
|
Inside the Modern Data Analytics Stack
|
Dave Armlin |
2024-04-25 |
1,343 |
--
|
|
How to Use Log Analytics for Insider Threat Detection
|
David Bunting |
2024-10-03 |
1,990 |
--
|
|
How to Detect Threats to AI Systems with MITRE ATLAS Framework
|
David Bunting |
2024-10-17 |
3,074 |
--
|
|
Why Monitoring Matters to ML Data Intelligence in Databricks
|
David Bunting |
2024-10-24 |
1,396 |
--
|
|
Crushing False Positives: Supercharging SOC Efficiency with Smarter Threat Intel
|
David Bunting |
2024-11-14 |
1,287 |
--
|
|
3 Databricks Mosaic AI Use Cases to Supercharge Your Log Analytics Program
|
David Bunting |
2024-11-25 |
1,774 |
--
|
|
Lakehouse Data Retention Tips for Your Most Pressing Security Use Cases
|
David Bunting |
2024-12-06 |
1,936 |
--
|
|
How Threat Hunters Can Detect Scattered Spider Attacks and Related Intrusions
|
David Bunting |
2024-12-12 |
1,208 |
--
|
|
5 DevSecOps Checklists to Embrace Advanced Techniques in 2025
|
David Bunting |
2025-01-03 |
2,291 |
--
|