Splunk

Cybersecurity with a Digital Twin: Why Real-Time Data Streaming Matters

Cyberattacks on critical infrastructure and manufacturing are growing, with ransomware and manipulated sensor data creating severe risks. Digital twins combined…

7 months ago

When to Use Reverse ETL and when it is an Anti-Pattern

This blog post explores why software vendors (try to) introduce new solutions for Reverse ETL, when Reverse ETL is really…

5 years ago

Kafka for Cybersecurity (Part 6 of 6) – SIEM / SOAR Modernization

This blog series explores use cases and architectures for Apache Kafka in the cybersecurity space, including situational awareness, threat intelligence,…

5 years ago

Kafka for Cybersecurity (Part 3 of 6) – Cyber Threat Intelligence

This blog series explores use cases and architectures for Apache Kafka in the cybersecurity space, including situational awareness, threat intelligence,…

5 years ago

Kafka for Cybersecurity (Part 1 of 6) – Data in Motion as Backbone

This blog series explores use cases and architectures for Apache Kafka in the cybersecurity space, including situational awareness, threat intelligence,…

5 years ago

Pulsar vs Kafka – Comparison and Myths Explored

Pulsar vs Kafka - which one is better? This blog post explores pros and cons, popular myths, and non-technical criteria…

6 years ago

Comparison Of Log Analytics for Distributed Microservices – Open Source Frameworks, SaaS and Enterprise Products

Log Analytics is the right framework or tool to monitor for Distributed Microservices. Comparison of Open source, SaaS and Enteprrise…

10 years ago

Framework and Product Comparison for Big Data Log Analytics and ITOA

Slide deck from OOP 2016: Comparison of Frameworks and Products for Big Data Log Analytics and ITOA, e.g. Open Source…

10 years ago