46 blog posts published by month since the start of 2024. Start from a different year:

Posts year-to-date
1 (4 posts by this month last year.)
Average posts per month since 2024
1.9

Post details (2024 to today)

Title Author Date Word count HN points
Understanding Security Log Analytics vs. SIEM for Midsized Companies Targeted by Cybercriminals Dave Armlin Jul 25, 2024 1366 -
Top Security Data Types: Exploring the OCSF Framework David Bunting May 02, 2024 1595 -
3 Straightforward Pros and Cons of Datadog for Log Analytics Dave Armlin Jan 04, 2024 1680 -
How MDR Services Can Optimize Threat Intelligence David Bunting Aug 08, 2024 1293 -
AWS vs GCP: Which Cloud Service Logs Can Provide the Most Valuable Data to Improve Your Business David Bunting Jun 06, 2024 1726 -
Process, Store and Analyze JSON Data with Ultimate Flexibility Sandro Lima Mar 21, 2024 1658 -
How to Get Started with a Security Data Lake David Bunting Aug 29, 2024 1431 -
How to Calculate Log Analytics ROI David Bunting Apr 12, 2024 1457 -
Innovating Security with Managed Detection & Response (MDR) and ChaosSearch David Bunting Jun 20, 2024 1145 -
From Legacy to Future-proof: Transforming Your Enterprise Data Architecture Dave Armlin Sep 05, 2024 1892 -
ELK Stack Costs Add Up: Here’s How to Switch David Bunting Feb 01, 2024 2489 -
The Top 5 Security Logging Best Practices to Follow Now David Bunting Jul 18, 2024 1174 -
6 Threat Detection Challenges for MDRs and How to Overcome Them David Bunting Aug 23, 2024 1456 -
Why Organizations are Using Grafana + Loki to Replace Datadog for Log Analytics David Bunting Apr 18, 2024 2280 -
How to Quickly Analyze CloudFront Cloud Logs in Amazon S3 David Bunting Jul 11, 2024 1264 -
6 Gaming Analytics Challenges and How To Solve Them David Bunting Jan 25, 2024 1561 -
5 Guiding Principles of Digital Business Observability David Bunting Jan 11, 2024 1661 -
Unpacking the Differences between AWS Redshift and AWS Athena Dave Armlin Mar 14, 2024 1514 -
Log and Event Analytics on Databricks: Overview and Use Cases David Bunting May 30, 2024 1765 -
How to Threat Hunt in Amazon Security Lake David Bunting Apr 04, 2024 999 -
Databricks Data Lakehouse Versus a Data Warehouse: What’s the Difference? David Bunting Sep 12, 2024 1413 -
How to Create an S3 Bucket with AWS CLI David Bunting May 09, 2024 2095 -
Threat Hunting Frameworks and Methodologies: An Introductory Guide Thomas Hazel Feb 08, 2024 1603 -
Inside DataOps: 3 Ways DevOps Analytics Can Create Better Products Dave Armlin Feb 29, 2024 1365 -
Improving Patch and Vulnerability Management with Proactive Security Analysis David Bunting Jul 01, 2024 1635 -
How to Search Your Cloud Data — With No Data Movement David Bunting Mar 28, 2024 1226 -
How to use GenAI for database query optimization and natural language analysis David Bunting Feb 16, 2024 1144 -
Databases Compared: Databricks vs. Snowflake vs. ChaosSearch vs. Elasticsearch David Bunting May 16, 2024 1992 -
5 Challenges Querying Data in Databricks + How to Overcome Them David Bunting Sep 19, 2024 1569 -
What is the Future of Apache Spark in Big Data Analytics? David Bunting Jul 04, 2024 1866 -
How To Use the MITRE ATT&CK Framework Thomas Hazel May 24, 2024 2284 -
Ultimate Guide to Amazon S3 Data Lake Observability for Security Teams Dave Armlin Aug 15, 2024 1731 -
How to Unlock Faster Analytics with Amazon S3 Express One Zone David Bunting Jan 18, 2024 1134 -
5 Best Practices for Streaming Analytics with S3 in the AWS Cloud David Bunting Feb 22, 2024 1624 -
5 Security Logging and Monitoring Mistakes to Avoid David Bunting Jun 13, 2024 1241 -
5 Proactive Security Engineering Techniques for Cloud-Native Teams David Bunting Mar 07, 2024 1458 -
The Power of Combining a Modular Security Data Lake with an XDR David Bunting Aug 02, 2024 1682 -
Inside the Modern Data Analytics Stack Dave Armlin Apr 25, 2024 1343 -
How to Use Log Analytics for Insider Threat Detection David Bunting Oct 03, 2024 1990 -
How to Detect Threats to AI Systems with MITRE ATLAS Framework David Bunting Oct 17, 2024 3074 -
Why Monitoring Matters to ML Data Intelligence in Databricks David Bunting Oct 24, 2024 1396 -
Crushing False Positives: Supercharging SOC Efficiency with Smarter Threat Intel David Bunting Nov 14, 2024 1287 -
3 Databricks Mosaic AI Use Cases to Supercharge Your Log Analytics Program David Bunting Nov 25, 2024 1774 -
Lakehouse Data Retention Tips for Your Most Pressing Security Use Cases David Bunting Dec 06, 2024 1936 -
How Threat Hunters Can Detect Scattered Spider Attacks and Related Intrusions David Bunting Dec 12, 2024 1208 -
5 DevSecOps Checklists to Embrace Advanced Techniques in 2025 David Bunting Jan 03, 2025 2291 -