Understanding Security Log Analytics vs. SIEM for Midsized Companies Targeted by Cybercriminals |
Dave Armlin |
Jul. 25, 2024 |
1366 |
- |
Top Security Data Types: Exploring the OCSF Framework |
David Bunting |
May. 02, 2024 |
1595 |
- |
3 Straightforward Pros and Cons of Datadog for Log Analytics |
Dave Armlin |
Jan. 04, 2024 |
1680 |
- |
How MDR Services Can Optimize Threat Intelligence |
David Bunting |
Aug. 08, 2024 |
1293 |
- |
AWS vs GCP: Which Cloud Service Logs Can Provide the Most Valuable Data to Improve Your Business |
David Bunting |
Jun. 06, 2024 |
1726 |
- |
Process, Store and Analyze JSON Data with Ultimate Flexibility |
Sandro Lima |
Mar. 21, 2024 |
1658 |
- |
How to Get Started with a Security Data Lake |
David Bunting |
Aug. 29, 2024 |
1431 |
- |
How to Calculate Log Analytics ROI |
David Bunting |
Apr. 12, 2024 |
1457 |
- |
Innovating Security with Managed Detection & Response (MDR) and ChaosSearch |
David Bunting |
Jun. 20, 2024 |
1145 |
- |
From Legacy to Future-proof: Transforming Your Enterprise Data Architecture |
Dave Armlin |
Sep. 05, 2024 |
1892 |
- |
ELK Stack Costs Add Up: Here’s How to Switch |
David Bunting |
Feb. 01, 2024 |
2489 |
- |
The Top 5 Security Logging Best Practices to Follow Now |
David Bunting |
Jul. 18, 2024 |
1174 |
- |
6 Threat Detection Challenges for MDRs and How to Overcome Them |
David Bunting |
Aug. 23, 2024 |
1456 |
- |
Why Organizations are Using Grafana + Loki to Replace Datadog for Log Analytics |
David Bunting |
Apr. 18, 2024 |
2280 |
- |
How to Quickly Analyze CloudFront Cloud Logs in Amazon S3 |
David Bunting |
Jul. 11, 2024 |
1264 |
- |
6 Gaming Analytics Challenges and How To Solve Them |
David Bunting |
Jan. 25, 2024 |
1561 |
- |
5 Guiding Principles of Digital Business Observability |
David Bunting |
Jan. 11, 2024 |
1661 |
- |
Unpacking the Differences between AWS Redshift and AWS Athena |
Dave Armlin |
Mar. 14, 2024 |
1514 |
- |
Log and Event Analytics on Databricks: Overview and Use Cases |
David Bunting |
May. 30, 2024 |
1765 |
- |
How to Threat Hunt in Amazon Security Lake |
David Bunting |
Apr. 04, 2024 |
999 |
- |
Databricks Data Lakehouse Versus a Data Warehouse: What’s the Difference? |
David Bunting |
Sep. 12, 2024 |
1413 |
- |
How to Create an S3 Bucket with AWS CLI |
David Bunting |
May. 09, 2024 |
2095 |
- |
Threat Hunting Frameworks and Methodologies: An Introductory Guide |
Thomas Hazel |
Feb. 08, 2024 |
1603 |
- |
Inside DataOps: 3 Ways DevOps Analytics Can Create Better Products |
Dave Armlin |
Feb. 29, 2024 |
1365 |
- |
Improving Patch and Vulnerability Management with Proactive Security Analysis |
David Bunting |
Jul. 01, 2024 |
1635 |
- |
How to Search Your Cloud Data — With No Data Movement |
David Bunting |
Mar. 28, 2024 |
1226 |
- |
How to use GenAI for database query optimization and natural language analysis |
David Bunting |
Feb. 16, 2024 |
1144 |
- |
Databases Compared: Databricks vs. Snowflake vs. ChaosSearch vs. Elasticsearch |
David Bunting |
May. 16, 2024 |
1992 |
- |
5 Challenges Querying Data in Databricks + How to Overcome Them |
David Bunting |
Sep. 19, 2024 |
1569 |
- |
What is the Future of Apache Spark in Big Data Analytics? |
David Bunting |
Jul. 04, 2024 |
1866 |
- |
How To Use the MITRE ATT&CK Framework |
Thomas Hazel |
May. 24, 2024 |
2284 |
- |
Ultimate Guide to Amazon S3 Data Lake Observability for Security Teams |
Dave Armlin |
Aug. 15, 2024 |
1731 |
- |
How to Unlock Faster Analytics with Amazon S3 Express One Zone |
David Bunting |
Jan. 18, 2024 |
1134 |
- |
5 Best Practices for Streaming Analytics with S3 in the AWS Cloud |
David Bunting |
Feb. 22, 2024 |
1624 |
- |
5 Security Logging and Monitoring Mistakes to Avoid |
David Bunting |
Jun. 13, 2024 |
1241 |
- |
5 Proactive Security Engineering Techniques for Cloud-Native Teams |
David Bunting |
Mar. 07, 2024 |
1458 |
- |
The Power of Combining a Modular Security Data Lake with an XDR |
David Bunting |
Aug. 02, 2024 |
1682 |
- |
Inside the Modern Data Analytics Stack |
Dave Armlin |
Apr. 25, 2024 |
1343 |
- |
How to Use Log Analytics for Insider Threat Detection |
David Bunting |
Oct. 03, 2024 |
1990 |
- |
How to Detect Threats to AI Systems with MITRE ATLAS Framework |
David Bunting |
Oct. 17, 2024 |
3074 |
- |
Why Monitoring Matters to ML Data Intelligence in Databricks |
David Bunting |
Oct. 24, 2024 |
1396 |
- |
Crushing False Positives: Supercharging SOC Efficiency with Smarter Threat Intel |
David Bunting |
Nov. 14, 2024 |
1287 |
- |
3 Databricks Mosaic AI Use Cases to Supercharge Your Log Analytics Program |
David Bunting |
Nov. 25, 2024 |
1774 |
- |