RESOURCES
Blogs
[{"id":4437,"link":"https:\/\/www.query.ai\/resources\/blogs\/query-security-data-pipelines\/","name":"query-security-data-pipelines","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/10\/2025-10-02_SDP-Availability.png","alt":"query security data pipeline availability blog header"},"title":"Product Release: General Availability of Query Security Data Pipelines","author":{"name":"Jonathan Rau","link":"https:\/\/www.query.ai\/resources\/author\/j-rau\/"},"date":"Oct 02, 2025","dateGMT":"2025-10-02 14:05:09","modifiedDate":"2025-10-02 10:05:10","modifiedDateGMT":"2025-10-02 14:05:10","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":11,"sec":25},"status":"publish","content":"Introduction The security industry at-large likes to brand data as \u201cthe new oil\u201d, or more frequently, as \u201cgravity\u201d. I disagree."},{"id":4422,"link":"https:\/\/www.query.ai\/resources\/blogs\/query-splunk-app-2-8-release\/","name":"query-splunk-app-2-8-release","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/09\/2025-09-30_Query-Splunk-App-28_tmb.png","alt":"query splunk app 2.8"},"title":"Product Release: Announcing Query Splunk App 2.8","author":{"name":"Dhiraj Sharan","link":"https:\/\/www.query.ai\/resources\/author\/dhiraj\/"},"date":"Sep 30, 2025","dateGMT":"2025-09-30 14:43:11","modifiedDate":"2025-09-30 10:43:13","modifiedDateGMT":"2025-09-30 14:43:13","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":4,"sec":27},"status":"publish","content":"Continuing with our fast pace of innovation, I am excited to announce the release of Query Splunk App 2.8, now"},{"id":4369,"link":"https:\/\/www.query.ai\/resources\/blogs\/investigate-dns-data-in-splunk\/","name":"investigate-dns-data-in-splunk","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/09\/2025-09-23_DNS-Investigation-Splunk.png","alt":"query splunk dns investigations"},"title":"Customer Success Stories: DNS Data Investigation From Splunk, While Reducing Costs","author":{"name":"Dhiraj Sharan","link":"https:\/\/www.query.ai\/resources\/author\/dhiraj\/"},"date":"Sep 23, 2025","dateGMT":"2025-09-23 14:32:04","modifiedDate":"2025-09-23 12:03:52","modifiedDateGMT":"2025-09-23 16:03:52","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":8,"sec":34},"status":"publish","content":"hr { margin: 3rem 0 !important; } .wp-block-code { margin: 2rem 0 !important; } DNS is one of the most"},{"id":4347,"link":"https:\/\/www.query.ai\/resources\/blogs\/the-data-advantage-security-data-mesh\/","name":"the-data-advantage-security-data-mesh","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/09\/2025-09-11_security-data-mesh-soc.png","alt":"security data mesh soc blog header"},"title":"The Data Advantage: Why a Security Data Mesh Is the Foundation for Modern SOCs","author":{"name":"Jonathan Rau","link":"https:\/\/www.query.ai\/resources\/author\/j-rau\/"},"date":"Sep 11, 2025","dateGMT":"2025-09-11 14:51:08","modifiedDate":"2025-09-11 10:51:08","modifiedDateGMT":"2025-09-11 14:51:08","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":17,"sec":13},"status":"publish","content":"Introduction AI SOC. Autonomous SOC. LLMs for Security Analysts. You\u2019ve seen it, we\u2019ve seen it, there is something there, but"},{"id":4340,"link":"https:\/\/www.query.ai\/resources\/blogs\/splunk-snowflake-federated-search\/","name":"splunk-snowflake-federated-search","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/09\/2025-09-10_Splunk-Snowflake-Federated-Search.png","alt":"splunk snowflake federated search"},"title":"Federated Search from Splunk to Snowflake (and More)","author":{"name":"Jonathan Rau","link":"https:\/\/www.query.ai\/resources\/author\/j-rau\/"},"date":"Sep 10, 2025","dateGMT":"2025-09-10 15:02:22","modifiedDate":"2025-09-11 10:15:05","modifiedDateGMT":"2025-09-11 14:15:05","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":10,"sec":45},"status":"publish","content":"Introduction A core tenet of the Query Security Data Mesh is providing operators access to data, wherever it lives. Whether"},{"id":4330,"link":"https:\/\/www.query.ai\/resources\/blogs\/customer-success-investigating-critical-cloud-vulnerabilities\/","name":"customer-success-investigating-critical-cloud-vulnerabilities","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/09\/2025-09-04_Cloud-Vulnerabilities.png","alt":"investigate cloud vulnerabilities blog header"},"title":"Customer Success Stories: Investigating Critical Vulnerabilities in Cloud Infrastructure","author":{"name":"Dhiraj Sharan","link":"https:\/\/www.query.ai\/resources\/author\/dhiraj\/"},"date":"Sep 04, 2025","dateGMT":"2025-09-04 14:43:02","modifiedDate":"2025-09-04 11:16:56","modifiedDateGMT":"2025-09-04 15:16:56","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":46},"status":"publish","content":"Investigating vulnerabilities is painful yet absolutely essential work that the security team regularly does. Doing it manually quickly becomes overwhelming,"},{"id":4231,"link":"https:\/\/www.query.ai\/resources\/blogs\/security-data-mesh-federated-search\/","name":"security-data-mesh-federated-search","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/08\/2025-08-12_Sentinel-Data-Lake.png","alt":"sentinel data lake blog header"},"title":"How To Navigate in the Era of Fast-Evolving Security Data Lakes","author":{"name":"Dhiraj Sharan","link":"https:\/\/www.query.ai\/resources\/author\/dhiraj\/"},"date":"Aug 12, 2025","dateGMT":"2025-08-12 14:03:59","modifiedDate":"2025-08-15 03:41:28","modifiedDateGMT":"2025-08-15 07:41:28","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":5,"sec":7},"status":"publish","content":"A few days back, Microsoft made big news across the cybersecurity landscape: Sentinel now has a built-in Data Lake \u2014"},{"id":4185,"link":"https:\/\/www.query.ai\/resources\/blogs\/security-data-pipelines-modern-data-storage\/","name":"security-data-pipelines-modern-data-storage","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/08\/2025-08-04_write-to-gold.png","alt":"write data to gold blog header"},"title":"Write to Gold with Query Security Data Pipelines","author":{"name":"Jonathan Rau","link":"https:\/\/www.query.ai\/resources\/author\/j-rau\/"},"date":"Aug 03, 2025","dateGMT":"2025-08-03 18:45:57","modifiedDate":"2025-08-03 23:09:57","modifiedDateGMT":"2025-08-04 03:09:57","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":9,"sec":39},"status":"publish","content":"Introduction How do all of these self-congratulating posts start, again? Oh right, \u201cin the ever-changing security threat bad guy landscape,"},{"id":4182,"link":"https:\/\/www.query.ai\/resources\/blogs\/query-agents-and-security-data-pipelines-launch\/","name":"query-agents-and-security-data-pipelines-launch","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/08\/2025-08-04_query-agents-pipelines-launch.png","alt":"query agents and pipelines launch blog header"},"title":"Announcing Query Security Data Pipelines and Query Agents","author":{"name":"Matt Eberhart","link":"https:\/\/www.query.ai\/resources\/author\/matt\/"},"date":"Aug 03, 2025","dateGMT":"2025-08-03 18:36:21","modifiedDate":"2025-08-04 10:23:11","modifiedDateGMT":"2025-08-04 14:23:11","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":4,"sec":21},"status":"publish","content":"Working side-by-side with some of the most data-forward security teams in the world, I am excited to share that Query"}]