[{"id":3573,"link":"https:\/\/www.query.ai\/resources\/webinars\/secdataopscast-more-data-in-the-soc-dream-or-nightmare\/","name":"secdataopscast-more-data-in-the-soc-dream-or-nightmare","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2024\/11\/2024-11-21_SDOC_ep11_tmb.png","alt":"secdataopscast episode 11"},"title":"SecDataOpsCast: More Data in the SOC: Dream or Nightmare?","excerpt":"","content":"On this episode of #SecDataOpsCast, BitLyft Cybersecurity Director of SOC Noah Hoag sat down with Query CISO Neal Bridges to","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Nov 22, 2024","dateGMT":"2024-11-22 21:04:18","modifiedDate":"2024-11-22 16:12:58","modifiedDateGMT":"2024-11-22 21:12:58","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a>, <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a> <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":21},"status":"publish"},{"id":3530,"link":"https:\/\/www.query.ai\/resources\/webinars\/navigating-emerging-technologies-ai-for-security\/","name":"navigating-emerging-technologies-ai-for-security","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2024\/11\/2024-10-24_tmb.png","alt":"cisco investments query webinar"},"title":"Cisco Investments Navigating Emerging Technologies \u2014 AI for Security: Matt Eberhart","excerpt":"","content":"Innovation Unleashed: Navigating Emerging Technologies \u2013 AI for Security \/ Security for AI features experts from Cisco, Cisco Investments, Query,","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Nov 12, 2024","dateGMT":"2024-11-13 02:20:01","modifiedDate":"2024-11-12 21:20:03","modifiedDateGMT":"2024-11-13 02:20:03","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a>, <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a> <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":26},"status":"publish"},{"id":3525,"link":"https:\/\/www.query.ai\/resources\/webinars\/secdataopscast-security-data-architecture-101\/","name":"secdataopscast-security-data-architecture-101","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2024\/11\/secdatopscast_ep10_tmb.jpg","alt":"secdataopscast episode 10 screenshot"},"title":"SecDataOpsCast: How To: Security Data Architecture 101","excerpt":"","content":"Feeling like your SIEM overfloweth? Can\u2019t find all that great data you know you have stashed somewhere, let alone put","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Nov 8, 2024","dateGMT":"2024-11-08 18:46:33","modifiedDate":"2024-11-08 13:46:34","modifiedDateGMT":"2024-11-08 18:46:34","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a>, <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a> <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":15},"status":"publish"},{"id":3389,"link":"https:\/\/www.query.ai\/resources\/webinars\/secdataopscast-security-data-lakes-and-siem\/","name":"secdataopscast-security-data-lakes-and-siem","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2024\/10\/SDOC-ep-9_tmb.jpg","alt":"SecDataOpsCast episode 9 thumbnail"},"title":"SecDataOpsCast: Security Data Lakes and SIEM \u2014 What's the Path Forward?","excerpt":"","content":"SIEM faces many challenges \u2014 it\u2019s costly, it\u2019s struggling to keep up with data types or volumes, it\u2019s driving complicated","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Oct 15, 2024","dateGMT":"2024-10-15 21:48:29","modifiedDate":"2024-10-15 17:48:31","modifiedDateGMT":"2024-10-15 21:48:31","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a>, <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a> <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":21},"status":"publish"},{"id":3314,"link":"https:\/\/www.query.ai\/resources\/webinars\/elevate-your-secdataops-game-with-query-and-amazon-security-lake\/","name":"elevate-your-secdataops-game-with-query-and-amazon-security-lake","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2024\/09\/2024-09-24_aws-webinar-tmb.png","alt":"query amazon security lake secdataops webinar"},"title":"Elevate Your SecDataOps Game with Query and Amazon Security Lake","excerpt":"","content":"Access to the right data for analysis is critical for efficient and effective investigations, threat hunting, incident response and general","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Sep 24, 2024","dateGMT":"2024-09-24 20:46:40","modifiedDate":"2024-09-24 16:46:41","modifiedDateGMT":"2024-09-24 20:46:41","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a>, <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a> <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":12},"status":"publish"},{"id":3193,"link":"https:\/\/www.query.ai\/resources\/webinars\/secdataopscast-data-in-the-soc\/","name":"secdataopscast-data-in-the-soc","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2024\/09\/2024-09-05_SDOC-ep8_tmb.jpg","alt":"secdataopscast episode 8 thumbnail"},"title":"SecDataOpsCast: Data in the SOC \u2014 Starving or Drowning?","excerpt":"","content":"We all know there is more data to analyze than ever, but our experience shows that data was almost never","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Sep 6, 2024","dateGMT":"2024-09-06 04:04:17","modifiedDate":"2024-09-06 00:04:19","modifiedDateGMT":"2024-09-06 04:04:19","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a>, <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a> <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":19},"status":"publish"},{"id":3175,"link":"https:\/\/www.query.ai\/resources\/webinars\/secdataopscast-modern-data-strategy-in-the-soc\/","name":"secdataopscast-modern-data-strategy-in-the-soc","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2024\/08\/2024-08-22_SDOC-tmb.jpg","alt":"SecDataOpsCast episode seven thumbnail"},"title":"SecDataOpsCast: Modern Data Strategy in the SOC","excerpt":"","content":"There was a SOC analyst who searched what he knew, But had so much data, he didn\u2019t know what to","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Aug 23, 2024","dateGMT":"2024-08-23 17:06:41","modifiedDate":"2024-08-23 13:06:42","modifiedDateGMT":"2024-08-23 17:06:42","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a>, <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a> <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":22},"status":"publish"},{"id":3166,"link":"https:\/\/www.query.ai\/resources\/webinars\/secdataopscast-global-security-review\/","name":"secdataopscast-global-security-review","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2024\/08\/2024-08-08_SDOC-tmb.jpg","alt":"SecDataOps Cast episode 6 thumbnail"},"title":"SecDataOpsCast: Global Security Review - From Business to AI Security","excerpt":"","content":"Listen as Query CISO Neal Bridges and Pearson VP of Cybersecurity and combat veteran Jax Scott discuss topics ranging from","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Aug 9, 2024","dateGMT":"2024-08-09 14:46:13","modifiedDate":"2024-08-09 10:46:14","modifiedDateGMT":"2024-08-09 14:46:14","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a>, <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a> <a href=\"https:\/\/www.query.ai\/resources\/category\/webinars\/\" rel=\"category tag\">Webinars<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":14},"status":"publish"},{"id":3151,"link":"https:\/\/www.query.ai\/resources\/videos\/query-overview\/","name":"query-overview","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2024\/07\/query-overview-tmb.jpg","alt":"Query Product Overview Video"},"title":"Query Overview","excerpt":"Watch how Query can speed up your cybersecurity investigations with true Federated Search for Security in this short overview.","content":"Query is a federated search solution for security operators, offering access, search, and insights from distributed security data without the","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Jul 29, 2024","dateGMT":"2024-07-29 20:09:07","modifiedDate":"2024-08-02 15:02:45","modifiedDateGMT":"2024-08-02 19:02:45","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/videos\/\" rel=\"category tag\">Videos<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":18},"status":"publish"}]