Insights SecOps OpEd Hoarding or Onboarding: Key Considerations of Security Data Strategy? Part 2 This is the second part in a three-part series. You can read part one here. February 28, 2025
Insights SecOps Use Case Emerging Security Telemetry Pipeline Operating Models Security operations teams are facing an overwhelming surge in telemetry data from endpoints, cloud platforms, ... January 30, 2025
Insights OpEd Hoarding or Onboarding: What is your security data strategy? Not so long ago, there was a time when not having sufficient data at hand was one of the first challenges ... January 21, 2025
Insights SecOps Rebuilding Trust in Threat Detection An Auguria Perspective Imagine you’re at a circus, juggling flaming torches, bowling pins, and the occasional ... October 22, 2024
Insights SecOps The Silent Threat of Alert Fatigue In the world of cybersecurity, few terms trigger people quite like alert fatigue. Borrowed from the medical ... October 17, 2024
Insights Unlocking the Power of Ontologies for Advanced Security Analytics – Part 3 This is the third and last in a series of articles written to help security analysts, security engineers, and ... October 17, 2024
Insights Why Your Next SIEM Will Analyze Vectors – Part 2 Vector database technology is poised to supersede and enhance traditional SIEM systems by overcoming the cost ... October 17, 2024
Insights Why Your Next SIEM Will Analyze Vectors – Part 1 Modern security data is growing not just in volume, but also in variety and complexity and these factors ... October 17, 2024
Insights The Road to Auguria: Conception of an Idea to Address Data Overload I met Chris Coulter in Los Angeles in 2009. We had just started work on a massive theft of trade secret case ... October 17, 2024