Data Integration

When to Use Reverse ETL and when it is an Anti-Pattern

This blog post explores why software vendors (try to) introduce new solutions for Reverse ETL, when Reverse ETL is really…

4 years ago

Kafka for Cybersecurity (Part 3 of 6) – Cyber Threat Intelligence

This blog series explores use cases and architectures for Apache Kafka in the cybersecurity space, including situational awareness, threat intelligence,…

4 years ago