Deploying a modern security data lake

Cybersecurity experts are overwhelmed, constantly on guard against malicious activity on their networks. Further complicating these external assaults are internal risks arising from simple errors, disgruntled employees, and outdated software configurations. Security experts today must act on the ass...

Full description

Bibliographic Details
Main Author: Baum, David
Format: eBook
Language:English
Published: Sebastopol, CA O'Reilly Media, Inc. 2022
Edition:First edition
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 01982nmm a2200325 u 4500
001 EB002068814
003 EBX01000000000000001208904
005 00000000000000.0
007 cr|||||||||||||||||||||
008 220922 ||| eng
050 4 |a QA76.9.A25 
100 1 |a Baum, David 
245 0 0 |a Deploying a modern security data lake  |c by David Baum 
250 |a First edition 
260 |a Sebastopol, CA  |b O'Reilly Media, Inc.  |c 2022 
300 |a 45 pages  |b illustrations 
653 |a Sécurité informatique 
653 |a Internet / Sécurité / Mesures 
653 |a Internet / Security measures 
653 |a Internet / Security measures / fast 
653 |a Computer security / http://id.loc.gov/authorities/subjects/sh90001862 
653 |a Cloud computing / Security measures 
653 |a Computer security / fast 
653 |a Infonuagique / Sécurité / Mesures 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 9781098134976 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781098134983/?ar  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a Cybersecurity experts are overwhelmed, constantly on guard against malicious activity on their networks. Further complicating these external assaults are internal risks arising from simple errors, disgruntled employees, and outdated software configurations. Security experts today must act on the assumption that all applications, services, identities, and networks are under threat. This report examines how security data lakes can complement or replace the traditional SIEM model. Author David Baum describes how to deploy a modern security data lake, using your organization's existing cloud data platform to deliver comprehensive visibility and powerful automation across multiple security use cases. Heads of cybersecurity, security operations, and data science will learn how to deliver comprehensive visibility and powerful automation across multiple security use cases