Understanding Security Log Analytics vs. SIEM for Midsized Companies Targeted by Cybercriminals |
Dave Armlin |
Jul. 25, 2024 |
1366 |
- |
Logs vs. Events: Exploring the Differences in Application Telemetry Data |
David Bunting |
Jun. 08, 2023 |
1016 |
- |
Top Security Data Types: Exploring the OCSF Framework |
David Bunting |
May. 02, 2024 |
1595 |
- |
Six Most Useful Types of Event Data for PLG |
David Bunting |
Jul. 06, 2023 |
1994 |
- |
A Simplified Guide to Cloud Data Platform Architecture |
David Bunting |
Jan. 12, 2023 |
1713 |
- |
Data Lake Architecture & The Future of Log Analytics |
Dave Armlin |
Jun. 15, 2023 |
1958 |
- |
3 Straightforward Pros and Cons of Datadog for Log Analytics |
Dave Armlin |
Jan. 04, 2024 |
1680 |
- |
ChaosSearch Pricing Models Explained |
André Rocha |
Apr. 03, 2023 |
922 |
- |
The Ultimate Guide to ELK Log Analysis |
George Hamilton |
Sep. 08, 2023 |
2259 |
- |
How MDR Services Can Optimize Threat Intelligence |
David Bunting |
Aug. 08, 2024 |
1293 |
- |
Data Lake vs Data Warehouse |
Thomas Hazel |
Aug. 31, 2023 |
2230 |
- |
AWS vs GCP: Which Cloud Service Logs Can Provide the Most Valuable Data to Improve Your Business |
David Bunting |
Jun. 06, 2024 |
1726 |
- |
5 ELK Stack Pros and Cons |
Thomas Hazel |
Jul. 27, 2023 |
1972 |
- |
Process, Store and Analyze JSON Data with Ultimate Flexibility |
Sandro Lima |
Mar. 21, 2024 |
1658 |
- |
How to Get Started with a Security Data Lake |
David Bunting |
Aug. 29, 2024 |
1431 |
- |
How to Calculate Log Analytics ROI |
David Bunting |
Apr. 12, 2024 |
1457 |
- |
Innovating Security with Managed Detection & Response (MDR) and ChaosSearch |
David Bunting |
Jun. 20, 2024 |
1145 |
- |
3 Reasons Why You Need an Embedded, Modern Database |
David Bunting |
Nov. 30, 2023 |
893 |
- |
From Legacy to Future-proof: Transforming Your Enterprise Data Architecture |
Dave Armlin |
Sep. 05, 2024 |
1892 |
- |
How Gaming Analytics and Player Interactions Enhance Mobile App Development |
David Bunting |
Aug. 17, 2023 |
1438 |
- |
Understanding Amazon Security Lake: Enhancing Data Security in the Cloud |
David Bunting |
Jul. 13, 2023 |
876 |
- |
ELK Stack Costs Add Up: Here’s How to Switch |
David Bunting |
Feb. 01, 2024 |
2489 |
- |
The Top 5 Security Logging Best Practices to Follow Now |
David Bunting |
Jul. 18, 2024 |
1174 |
- |
6 Threat Detection Challenges for MDRs and How to Overcome Them |
David Bunting |
Aug. 23, 2024 |
1456 |
- |
3 Effective Tips for Cloud-Native Compliance |
David Bunting |
Mar. 17, 2023 |
1301 |
- |
Why Organizations are Using Grafana + Loki to Replace Datadog for Log Analytics |
David Bunting |
Apr. 18, 2024 |
2280 |
- |
5 Ways to Use Log Analytics and Telemetry Data for Fraud Prevention |
David Bunting |
Apr. 27, 2023 |
1461 |
- |
How to Build a Culture of Data-Driven Product Management |
David Bunting |
Apr. 13, 2023 |
1016 |
- |
A Deep Dive into Multi-Model Databases: Hype vs. Reality |
Thomas Hazel |
Dec. 28, 2023 |
2334 |
- |
The Evolution of Search: How Multi-Modal LLMs Transcend Vector Databases |
Thomas Hazel |
Oct. 14, 2023 |
1348 |
- |
How to Quickly Analyze CloudFront Cloud Logs in Amazon S3 |
David Bunting |
Jul. 11, 2024 |
1264 |
- |
Are Elasticsearch or OpenSearch Serverless Architectures Effective? |
David Bunting |
Jun. 22, 2023 |
1470 |
- |
Data Retention Policy Guide |
Dave Armlin |
Aug. 10, 2023 |
2825 |
- |
CloudWatch Logs to S3: The Easy Way |
David Bunting |
May. 25, 2023 |
1120 |
- |
6 Gaming Analytics Challenges and How To Solve Them |
David Bunting |
Jan. 25, 2024 |
1561 |
- |
How to discover advanced persistent threats in AWS |
David Bunting |
Jan. 19, 2023 |
1104 |
- |
5 Guiding Principles of Digital Business Observability |
David Bunting |
Jan. 11, 2024 |
1661 |
- |
Leveraging Amazon S3 Cloud Object Storage for Analytics |
Thomas Hazel |
Dec. 08, 2023 |
1866 |
- |
What is an Internal Developer Platform (IDP) and Why It Matters |
David Bunting |
May. 18, 2023 |
1347 |
- |
Unpacking the Differences between AWS Redshift and AWS Athena |
Dave Armlin |
Mar. 14, 2024 |
1514 |
- |
The Best Way to Index and Query JSON Logs |
David Bunting |
Oct. 06, 2023 |
3095 |
- |
10 DevOps Tools for Continuous Monitoring |
Dave Armlin |
Apr. 21, 2023 |
2195 |
- |
Log and Event Analytics on Databricks: Overview and Use Cases |
David Bunting |
May. 30, 2024 |
1765 |
- |
How to Threat Hunt in Amazon Security Lake |
David Bunting |
Apr. 04, 2024 |
999 |
- |
4 Challenges of Serverless Log Management in AWS |
David Bunting |
Mar. 09, 2023 |
1302 |
- |
How to Reduce Continuous Monitoring Costs |
David Bunting |
Sep. 29, 2023 |
1011 |
- |
Databricks Data Lakehouse Versus a Data Warehouse: What’s the Difference? |
David Bunting |
Sep. 12, 2024 |
1413 |
- |
Cloud Object Storage-based Architectures are Natively Scalable and Available |
Thomas Hazel |
Jan. 05, 2023 |
2302 |
- |
What is a Real-Time Data Lake? |
David Bunting |
Aug. 24, 2023 |
1348 |
- |
How to Create an S3 Bucket with AWS CLI |
David Bunting |
May. 09, 2024 |
2095 |
- |
What is Platform Engineering and Why Does It Matter? |
David Bunting |
Mar. 30, 2023 |
1499 |
- |
6 Reasons Your Data Lake Isn’t Working Out |
David Bunting |
Nov. 09, 2023 |
1310 |
- |
A Simplified Guide to Kubernetes Monitoring |
David Bunting |
Nov. 23, 2023 |
2363 |
- |
5 Advanced DevSecOps Techniques to Try in 2023 |
David Bunting |
Feb. 02, 2023 |
1586 |
- |
An Overview of Streaming Analytics in AWS for Logging Applications |
David Bunting |
Feb. 09, 2023 |
1662 |
- |
Threat Hunting Frameworks and Methodologies: An Introductory Guide |
Thomas Hazel |
Feb. 08, 2024 |
1603 |
- |
8 Challenges of Microservices and Serverless Log Management |
David Bunting |
Jul. 20, 2023 |
2019 |
- |
Amazon Security Lake & ChaosSearch deliver security analytics with industry-leading cost & unlimited retention |
Sandro Lima |
May. 30, 2023 |
895 |
- |
OpenSearch vs. Elasticsearch: Which is Better? |
David Bunting |
Oct. 26, 2023 |
1463 |
- |
Data lake vs. data mesh: Which one is right for you? |
Thomas Hazel |
Mar. 23, 2023 |
1439 |
- |
Inside DataOps: 3 Ways DevOps Analytics Can Create Better Products |
Dave Armlin |
Feb. 29, 2024 |
1365 |
- |
5 AWS Logging Tips and Best Practices |
Sandro Lima |
Sep. 21, 2023 |
1941 |
- |
How to Create a Dashboard in Kibana |
Sandro Lima |
Feb. 17, 2023 |
2245 |
- |
Improving Patch and Vulnerability Management with Proactive Security Analysis |
David Bunting |
Jul. 01, 2024 |
1635 |
- |
How to Search Your Cloud Data — With No Data Movement |
David Bunting |
Mar. 28, 2024 |
1226 |
- |
How to use GenAI for database query optimization and natural language analysis |
David Bunting |
Feb. 16, 2024 |
1144 |
- |
SIEM Logging for Enterprise Security Operations and Threat Hunting |
Dave Armlin |
Oct. 19, 2023 |
2007 |
- |
Databases Compared: Databricks vs. Snowflake vs. ChaosSearch vs. Elasticsearch |
David Bunting |
May. 16, 2024 |
1992 |
- |
5 Challenges Querying Data in Databricks + How to Overcome Them |
David Bunting |
Sep. 19, 2024 |
1569 |
- |
3 Ways FinTechs Can Improve Cloud Observability at Scale |
David Bunting |
Sep. 15, 2023 |
1360 |
- |
What is the Future of Apache Spark in Big Data Analytics? |
David Bunting |
Jul. 04, 2024 |
1866 |
- |
How To Use the MITRE ATT&CK Framework |
Thomas Hazel |
May. 24, 2024 |
2284 |
- |
Ultimate Guide to Amazon S3 Data Lake Observability for Security Teams |
Dave Armlin |
Aug. 15, 2024 |
1731 |
- |
How to Unlock Faster Analytics with Amazon S3 Express One Zone |
David Bunting |
Jan. 18, 2024 |
1134 |
- |
How to Use Operational IT Data for PLG |
David Bunting |
Mar. 02, 2023 |
922 |
- |
5 Best Practices for Streaming Analytics with S3 in the AWS Cloud |
David Bunting |
Feb. 22, 2024 |
1624 |
- |
Buyer Beware! Three Challenges with Elasticsearch and OpenSearch |
David Bunting |
Nov. 02, 2023 |
1539 |
- |
Data-Led Growth: How FinTechs Win with App Event Analytics |
David Bunting |
Jun. 29, 2023 |
2608 |
- |
5 Security Logging and Monitoring Mistakes to Avoid |
David Bunting |
Jun. 13, 2024 |
1241 |
- |
5 Multi-cloud Data Management Best Practices You Should Follow |
David Bunting |
Dec. 14, 2023 |
1505 |
- |
Why Log Analytics is Key to Unlocking the Value of XDR for Enterprises |
David Bunting |
Apr. 06, 2023 |
1563 |
- |
3 Ways to Break Down SaaS Data Silos |
David Bunting |
May. 11, 2023 |
1082 |
- |
Can You Use the ELK Stack as a SIEM? A Fresh Take |
David Bunting |
Oct. 12, 2023 |
1226 |
- |
5 Proactive Security Engineering Techniques for Cloud-Native Teams |
David Bunting |
Mar. 07, 2024 |
1458 |
- |
The Power of Combining a Modular Security Data Lake with an XDR |
David Bunting |
Aug. 02, 2024 |
1682 |
- |
Inside the Modern Data Analytics Stack |
Dave Armlin |
Apr. 25, 2024 |
1343 |
- |
From Silos to Collaboration: How to Democratize Data in Product Analytics |
David Bunting |
May. 04, 2023 |
1680 |
- |
Best Practices for Effective Log Management |
David Bunting |
Dec. 21, 2023 |
1648 |
- |
10 AWS Data Lake Best Practices |
Dave Armlin |
Jun. 01, 2023 |
2388 |
- |
How to Use Log Analytics for Insider Threat Detection |
David Bunting |
Oct. 03, 2024 |
1990 |
- |
How to Detect Threats to AI Systems with MITRE ATLAS Framework |
David Bunting |
Oct. 17, 2024 |
3074 |
- |
Why Monitoring Matters to ML Data Intelligence in Databricks |
David Bunting |
Oct. 24, 2024 |
1396 |
- |
Crushing False Positives: Supercharging SOC Efficiency with Smarter Threat Intel |
David Bunting |
Nov. 14, 2024 |
1287 |
- |