Skip to main content
Page 1

Cybersecurity Lakehouses Best Practices Part 4: Data Normalization Strategies

November 17, 2023 by Derek King in
In this four-part blog series "Lessons learned from building Cybersecurity Lakehouses," we are discussing a number of challenges organizations face with data engineering...

Cybersecurity Lakehouses Part 3: Data Parsing Strategies

November 10, 2023 by Derek King in
In this four-part blog series, "Lessons learned from building Cybersecurity Lakehouses," we are discussing a number of challenges organizations face with data engineering...

Cybersecurity Lakehouses Part 2: Handling Ingestion Delays

November 8, 2023 by Derek King in
In this four-part blog series “ Lessons learned building Cybersecurity Lakehouses, ” we are discussing a number of challenges organizations face with data...

Cybersecurity Lakehouse Best Practices Part 1: Event Timestamp Extraction

November 3, 2023 by Derek King in
In this four-part blog series "Lessons learned from building Cybersecurity Lakehouses," we will discuss a number of challenges organizations face with data engineering...

Streaming Windows Event Logs into the Cybersecurity Lakehouse

May 5, 2022 by Derek King in
Streaming windows events into the Cybersecurity Lakehouse Enterprise customers often ask, what is the easiest and simplest way to send Windows endpoint logs...

Hunting Anomalous Connections and Infrastructure With TLS Certificates

January 20, 2022 by Derek King in
According to Sophos, 46% of all malware now uses Transport Layer Security (TLS) to conceal its communication channels. A number that has doubled...