June 28, 2024
Monad Community Bytes - June 2024

Monad Community Bytes🍪
Hello and welcome to the June edition of Monad Community Bytes!
The security operations space has gone through a bit of transformation and consolidation since we last caught up. LogRhythm and Exabeam have merged forces, and Palo Alto Networks partnered with IBM to acquire Qradar. Additionally, Cribl, Splunk, and AWS Security hosted their annual conferences with many announcements around security data management which you can read more about here.
Needless to say, the paradigms are shifting. Security teams are struggling to keep up with the ever-increasing data volumes leading to more teams adopting security data lakes, multi-data platform approaches or even building out their own SIEM-like platforms. At the core of all of this is data ETL.
At Monad, we've been at the forefront of this transformation. Over the past six months, we've dedicated ourselves to developing the next generation of security data ETL solutions designed to manage the ever-growing scale of security data.
We’re thrilled to announce that in the coming months, we will be rolling out early access to our new ETL platform, gradually opening it up to our entire community!
Thank you for coming along with us on this journey to make security more data-driven and to improve outcomes for security programs. Now, let's get into some of this month's best articles!
Why Hackers Love Logs

If you've worked under any capacity in security operations, you understand just how much valuable context security logs provide. After all, they're what allow us to detect and respond to threats. However, when you flip this model on its head and look at security logs from an attacker perspective, you may be stunned to learn how much they can also help attackers.
Not only do logs help inform attackers about the environment, crown jewels, and baseline user activity, but they may also contain PII and other sensitive information. Attackers can also tamper with logs to hide their tracks and remain undetected for months on end. This article takes a deep look at why logs are attractive to attackers and what teams can do to defend against such threats.
Picking the Right Database Tech for Security

Security teams are often drowning in data and logs which makes sifting through the noise exponentially tougher. With data volumes growing at a 23% compounded annual growth rate (CAGR), there's seemingly no end in sight. However, security teams have been adopting advanced data engineering tactics and technologies that enable them to make sense of the madness.
This post dives into the exciting world of graph databases and data streaming technologies to explore how security teams can use them to supercharge their security operations.
Data Processing in Cybersecurity

We recently released Part III of our Data Engineering for Cybersecurity blog series. In this installment, we highlight the challenges that security teams face with the variability in data quality and formatting conventions across data sources. These inconsistencies often lead to blind spots, low-fidelity detections, and they eat up security team's time. One key ingredient to tackling this problem is data processing.
Check out our blog post here to get an inside look at the data processing practices security teams are adopting today!
Read more
Join Our Slack Community!

If you're a security practitioner that builds data pipelines, log parsers, KPI dashboards and/or are deep in the detection and response weeds and would like to join our exclusive Slack community, shoot us a message at community@monad.com!
We have tons of surprises and presentations with some of your favorite industry SMEs. Join us. We're just getting started! 😏
Have Feedback?
If you have any feedback on how to make these monthly digests more valuable or relevant to you, please reach out to us at feedback@monad.com!
Related content






