New Blog --> Crushing False Positives: Supercharging SOC Efficiency with Smarter Threat Intel
New Blog --> Crushing False Positives: Supercharging SOC Efficiency with Smarter Threat Intel
Start Free Trial

ChaosSearch BlogPage 3

8 MIN READ

5 Security Logging and Monitoring Mistakes to Avoid

By David Bunting on Jun 13, 2024

As cybersecurity attack vectors evolve, security logging and monitoring are becoming even...

TOPIC

12 MIN READ

Log and Event Analytics on Databricks: Overview and Use Cases

By David Bunting on May 30, 2024

Built on the foundation of Apache Spark, Databricks is a unified, open data lakehouse platform...

16 MIN READ

How To Use the MITRE ATT&CK Framework

By Thomas Hazel on May 24, 2024

MITRE ATT&CK® is an invaluable resource for IT security teams, who can leverage the framework to...

11 MIN READ

Top Security Data Types: Exploring the OCSF Framework

By David Bunting on May 2, 2024

In cybersecurity, it’s a big challenge to handle diverse data formats across various platforms. The

16 MIN READ

Why Organizations are Using Grafana + Loki to Replace Datadog for Log Analytics

By David Bunting on Apr 18, 2024

Datadog is a Software-as-a-Service (SaaS) cloud monitoring solution that enables multiple...

7 MIN READ

How to Threat Hunt in Amazon Security Lake

By David Bunting on Apr 4, 2024

Establishing a proactive security posture involves a data-driven approach to threat detection,...

11 MIN READ

Process, Store and Analyze JSON Data with Ultimate Flexibility

By Sandro Lima on Mar 21, 2024

Javascript Object Notation (JSON) is becoming the standard log format, with most modern...

Subscribe to Our Blog