Resources / Monad Community Bytes / Monad Community Bytes - June 2024

June 28, 2024

Monad Community Bytes - June 2024

Monad Community Bytes · min read

Monad Community Bytes🍪

Hello and welcome to the June edition of Monad Community Bytes!  

The security operations space has gone through a bit of transformation and consolidation since we last caught up. ​​LogRhythm and Exabeam have merged forces, and Palo Alto Networks partnered with IBM to acquire Qradar. Additionally, Cribl, Splunk, and AWS Security hosted their annual conferences with many announcements around security data management which you can read more about here.

Needless to say, the paradigms are shifting. Security teams are struggling to keep up with the ever-increasing data volumes leading to more teams adopting security data lakes, multi-data platform approaches or even building out their own SIEM-like platforms. At the core of all of this is data ETL.

At Monad, we've been at the forefront of this transformation. Over the past six months, we've dedicated ourselves to developing the next generation of security data ETL solutions designed to manage the ever-growing scale of security data.

We’re thrilled to announce that in the coming months, we will be rolling out early access to our new ETL platform, gradually opening it up to our entire community!

Thank you for coming along with us on this journey to make security more data-driven and to improve outcomes for security programs. Now, let's get into some of this month's best articles!

Why Hackers Love Logs

Hacker-Log-files

If you've worked under any capacity in security operations, you understand just how much valuable context security logs provide. After all, they're what allow us to detect and respond to threats. However, when you flip this model on its head and look at security logs from an attacker perspective, you may be stunned to learn how much they can also help attackers.

Not only do logs help inform attackers about the environment, crown jewels, and baseline user activity, but they may also contain PII and other sensitive information. Attackers can also tamper with logs to hide their tracks and remain undetected for months on end. This article takes a deep look at why logs are attractive to attackers and what teams can do to defend against such threats.

Read more

Picking the Right Database Tech for Security

Eakrin_Rasadonyindee-database-connections-shutterstock

Security teams are often drowning in data and logs which makes sifting through the noise exponentially tougher. With data volumes growing at a 23% compounded annual growth rate (CAGR), there's seemingly no end in sight. However, security teams have been adopting advanced data engineering tactics and technologies that enable them to make sense of the madness.

This post dives into the exciting world of graph databases and data streaming technologies to explore how security teams can use them to supercharge their security operations.

Read more

Data Processing in Cybersecurity

6673067fbc03532a8e7918ad_Monad-Part3-v5-R2-p-1600

We recently released Part III of our Data Engineering for Cybersecurity blog series. In this installment, we highlight the challenges that security teams face with the variability in data quality and formatting conventions across data sources. These inconsistencies often lead to blind spots, low-fidelity detections, and they eat up security team's time. One key ingredient to tackling this problem is data processing.

Check out our blog post here to get an inside look at the data processing practices security teams are adopting today!

Read more

Join Our Slack Community!

Screenshot 2024-05-22 at 3.50.04 PM-1

If you're a security practitioner that builds data pipelines, log parsers, KPI dashboards and/or are deep in the detection and response weeds and would like to join our exclusive Slack community, shoot us a message at community@monad.com!

We have tons of surprises and presentations with some of your favorite industry SMEs. Join us. We're just getting started! 😏

Have Feedback?

If you have any feedback on how to make these monthly digests more valuable or relevant to you, please reach out to us at feedback@monad.com!

Darwin Salazar

Darwin Salazar

About
About

Related content

Monad Community Bytes - March 2025

|

March 26, 2025

Monad Community Bytes - March 2025

Monad Community Bytes - February 2025

Darwin Salazar

|

February 25, 2025

Monad Community Bytes - February 2025

Monad Community Bytes - January 2025

Darwin Salazar

|

January 17, 2025

Monad Community Bytes - January 2025

Monad Community Bytes - December 2024

Darwin Salazar

|

December 20, 2024

Monad Community Bytes - December 2024

Monad Community Bytes - November 2024

Darwin Salazar

|

November 22, 2024

Monad Community Bytes - November 2024

Monad Community Bytes - October 2024

Darwin Salazar

|

October 30, 2024

Monad Community Bytes - October 2024

Monad Community Bytes - August 2024

Darwin Salazar

|

August 28, 2024

Monad Community Bytes - August 2024

Monad Community Bytes - July 2024

Darwin Salazar

|

July 30, 2024

Monad Community Bytes - July 2024

Monad Community Bytes - June 2024

Darwin Salazar

|

June 28, 2024

Monad Community Bytes - June 2024

Monad Community Bytes - May 2024

Darwin Salazar

|

May 30, 2024

Monad Community Bytes - May 2024

Monad Community Bytes - April 2024

Darwin Salazar

|

April 26, 2024

Monad Community Bytes - April 2024

Monad Community Bytes - March 2024

Darwin Salazar

|

March 28, 2024

Monad Community Bytes - March 2024

Monad Community Bytes - February 2024

Darwin Salazar

|

February 28, 2024

Monad Community Bytes - February 2024

ETL for Security, Made Easy

Effortlessly transform, filter, and route your security data. Tune out the noise, surface the signal, and achieve data nirvana with Monad.