Understanding data lakes and security

Thumb original logrhythm hot topic datalakes web

The cyberthreat landscape has never been more complex and fast moving. This means any new technology that can be used in the fight against cybercrime can bring real value to the security operations centre (SOC).

Given how organisations across numerous industries are increasingly using big data and analytics to extract the maximum value from their information, it makes sense that the same techniques could be applied to security data, which is becoming increasingly plentiful.

A relatively recent addition to the big data armoury is the concept of data lakes, in which a vast range of raw data is pulled together and stored in its original format. Thanks to a flat architecture, data lakes allow analytics tools to work across data that may not have been associated before, generating new insights for businesses and security teams.

These features make data lakes a powerful tool for corporate security teams, particularly with the high likelihood that corporate networks will be compromised.

View Whitepaper
Logrythm logo
Provider: LogRhythm EMEA   |   Size: 578 KB   |   Language: English
Keep Reading:
Thumb original uk uws using mitre attack in threat hunting and detection white paper

Using MITRE ATT&CK™ in Threat Hunting and Detection

MITRE ATT&CK1 is an open framework and knowledge base of adversary tactics and techniques based on real-world observations. ATT&CK provides a common taxonomy of the tactical objectives of adversaries and their methods. Having a taxonomy by itself has many valuable uses, such as providing a common vocabulary for exchanging information with others in the security community. But it also serves as a real technical framework for classifying your current detection efforts and identifying gaps where you are blind to certain types of attack beh ...

Access this Whitepaper
Thumb original uk the security operations maturity model quick reference guide brochure

The Security Operations Maturity Model Quick Reference Guide

Organisations should think of security operations as a critical business process. Effective security operations are the first line of defence when it comes to preventing cyberattacks. To accomplish this, organisations need mature programs that leverage people, process and technology to rapidly detect and respond to sophisticated attacks.

Yet some organisations struggle with the overall effectiveness of their security operations. They also lack the basis for measuring the effectiveness and maturing capabilities. A mature security operation e ...

Access this Whitepaper
Thumb original 203761 aws mad 2021 modern apps ebook final digital

Build modern applications on AWS

In this eBook, we’ll guide you through the three pathways that will help lay the foundation for modern application development in your own organization. We’ll also explore how modern application development with AWS can help your organization innovate, reduce costs, accelerate time to market, and improve reliability. ...

Access this E-Book
Thumb original 203755 aws mad tco ebook 2021 final

Determining the Total Cost of Ownership: Comparing Serverless and Server-based Technologies

The popularity of a serverless strategy is growing because it provides the opportunity for faster time to market by dynamically and automatically allocating compute and memory based on user requests. It also provides cost savings through hands-off infrastructure management, which enables organizations to redirect IT budget and development resources from operations to innovation.In 2019, we introduced a framework for comparing the total cost of ownership (TCO) for both serverless and server-based applications, factoring in infrastructure, develo ...

Access this E-Book
Thumb original 203753 aws modernization containers ebook final

Modernize today with containers on AWS

Companies worldwide are undergoing digital transformations. By modernizing their applications, they can deliver better service to customers and keep pace in a competitive landscape. One way AWS helps companies modernize is by implementing containers and initiating cultural shifts to streamline development. In this eBook, we discuss best practices in containerization and how you can get started today with containers on AWS. ...

Access this E-Book