Blog

Articles on security data engineering, security challenges, security data lakes and more.

Product Release Notes - June 2025

Darwin Salazar

|

June 25, 2025

Product Release Notes - June 2025

Announcing Monad’s OCSF Templates!

Darwin Salazar

|

June 16, 2025

Announcing Monad’s OCSF Templates!

Product Release Notes - May 2025

Darwin Salazar

|

May 28, 2025

Product Release Notes - May 2025

Data Engineering for Cybersecurity, Part 5: Enrichment

Darwin Salazar

|

April 8, 2025

Data Engineering for Cybersecurity, Part 5: Enrichment

Product Release Notes - March 2025

Darwin Salazar

|

March 31, 2025

Product Release Notes - March 2025

Product Release Notes - February 2025

Darwin Salazar

|

February 27, 2025

Product Release Notes - February 2025

2025 State of Detection Engineering Report: What You Need to Know!

Darwin Salazar

|

February 25, 2025

2025 State of Detection Engineering Report: What You Need to Know!

Product Release Notes - January 2025

Darwin Salazar

|

January 22, 2025

Product Release Notes - January 2025

Data Engineering For Cybersecurity, Part 4: Data Transformation

Darwin Salazar

|

November 21, 2024

Data Engineering For Cybersecurity, Part 4: Data Transformation

Data Engineering for Cybersecurity, Part 3: Data Processing

|

June 20, 2024

Data Engineering for Cybersecurity, Part 3: Data Processing

Data Engineering for Cybersecurity, Part 2: Collection and Storage

|

April 24, 2024

Data Engineering for Cybersecurity, Part 2: Collection and Storage

Data Engineering For Cybersecurity, Part I: Understanding Security Data

|

March 11, 2024

Data Engineering For Cybersecurity, Part I: Understanding Security Data

Advancing Data-Driven Security: Monad Adds CrowdStrike EDR, Elasticsearch, and GitHub Advisory

|

November 28, 2023

Advancing Data-Driven Security: Monad Adds CrowdStrike EDR, Elasticsearch, and GitHub Advisory

Ransomware Visibility at Your Fingertips: Monad Adopts CISA’s KEV Ransomware Column

|

October 20, 2023

Ransomware Visibility at Your Fingertips: Monad Adopts CISA’s KEV Ransomware Column

Advancing Security Data Management with Amazon Security Lake

|

October 11, 2023

Advancing Security Data Management with Amazon Security Lake

AppSec, Turbocharged: Harnessing Semgrep, Monad, and Snowflake for Peak Efficiency, Coverage and Visibility

|

October 17, 2023

AppSec, Turbocharged: Harnessing Semgrep, Monad, and Snowflake for Peak Efficiency, Coverage and Visibility

Monad Basic: Start moving and transforming security data today

|

September 12, 2023

Monad Basic: Start moving and transforming security data today

Wrangling your cybersecurity data with Monad and Databricks

|

July 20, 2023

Wrangling your cybersecurity data with Monad and Databricks

How to navigate the maze of security API data limits

|

June 7, 2023

How to navigate the maze of security API data limits

Monad partners with Databricks to bring data-driven security to customers

|

April 18, 2023

Monad partners with Databricks to bring data-driven security to customers

Monad integrates with Snyk, improves vulnerability management for Vertiv

|

April 6, 2023

Monad integrates with Snyk, improves vulnerability management for Vertiv

How I transformed my job using Monad (at Monad)

|

September 15, 2022

How I transformed my job using Monad (at Monad)

Monad’s value as a software engineer

|

August 4, 2022

Monad’s value as a software engineer

Unify vulnerability data with Monad and Snowflake

|

June 2, 2022

Unify vulnerability data with Monad and Snowflake

Why we launched Monad today

|

August 26, 2021

Why we launched Monad today

ETL for Security, Made Easy

Effortlessly transform, filter, and route your security data. Tune out the noise, surface the signal, and achieve data nirvana with Monad.