Article: The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments - published almost 4 years ago.
Content: I recently wrote a post about the concept of the Data Lakehouse, which in some ways, brings components of what I outlined in the first post around my desires for a new database system to life. In this post, I am going to make an attempt to describe a roll-up of some recent big data developments that you should be aware of.
Let’s start with the lowest laye...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-3-catching-up-with-the-latest-big-data-developments/
Article: Asset Management – Back To The Roots - published over 3 years ago.
Content: Asset management is one of the core components of many successful security programs. I am an advisor to Panaseer, a startup in the continuous compliance management space. I recently co-authored a blog post on my favorite security metric that is related to asset management:
How many assets are in the environment?
A simple number. A number that tells a c...
https://raffy.ch/blog/2021/03/31/asset-management-back-to-the-roots/
Article: A Security Product Reference Model - published over 3 years ago.
Content: On a recent consulting engagement with Cynergy Partners, we needed to decipher the security product market to an investment firm that normally doesn’t invest in cyber security. One of the investor’s concerns was that a lot of cyber companies are short-lived businesses due to the threats changing so drastically quick. One day it’s ransomware X, the next day i...
https://raffy.ch/blog/2021/04/16/a-security-product-reference-model/
Article: Taking Inventory – Where Do We Stand With AI and ML in Cyber Security? - published over 3 years ago.
Content: Before diving into cyber security and how the industry is using AI at this point, let’s define the term AI first. Artificial Intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including Deep Learning, and unsupervised), as well as other algorithmic approaches that are more than just simple statisti...
https://raffy.ch/blog/2021/05/19/taking-inventory-where-do-we-stand-with-ai-and-ml-in-cyber-security/
Article: A Logging History Lesson – From syslogd(8) to XDR - published over 3 years ago.
Content: The log management and security information management (SIEM) space have gone through a number of stages to arrive where they are today. I started mapping the space in the 1980’s when syslog entered the world. To make sense of the really busy diagram, the top shows the chronological timeline (not in equidistant notation!), the second swim lane underneath cal...
https://raffy.ch/blog/2021/06/08/a-logging-history-lesson-from-syslogd8-to-xdr/
Article: Leadership | Technology | Spirit - published 3 months ago.
Content: Who knows, I might just pick up my blogging again at some point. For now, I posted a short leadership related post on my Leadership | Technology | Spirit blog. Check it out.
The post Leadership | Technology | Spirit first appeared on Cyber Security - Strategy and Innovation....
https://raffy.ch/blog/2024/08/28/leadership-technology-spirit/
Article: Asset Management – Back To The Roots - published over 3 years ago.
Content: Asset management is one of the core components of many successful security programs. I am an advisor to Panaseer, a startup in the continuous compliance management space. I recently co-authored a blog post on my favorite security metric that is related to asset management:
How many assets are in the environment?
A simple number. A number that tells a c...
https://raffy.ch/blog/2021/03/31/asset-management-back-to-the-roots/
Article: A Logging History Lesson – From syslogd(8) to XDR - published over 3 years ago.
Content: The log management and security information management (SIEM) space have gone through a number of stages to arrive where they are today. I started mapping the space in the 1980’s when syslog entered the world. To make sense of the really busy diagram, the top shows the chronological timeline (not in equidistant notation!), the second swim lane underneath cal...
https://raffy.ch/blog/2021/06/08/a-logging-history-lesson-from-syslogd8-to-xdr/
Article: How To Drive Value with Security Data – The Full Talk - published over 3 years ago.
Content: Last week I keynoted LogPoint’s customer conference with a talk about how to extract value from security data. Pretty much every company out there has tried to somehow leverage their log data to manage their infrastructure and protect their assets and information. The solution vendors have initially named the space log management and then security informatio...
https://raffy.ch/blog/2021/06/12/how-to-drive-value-with-security-data-the-full-talk/
Article: The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments - published almost 4 years ago.
Content: I recently wrote a post about the concept of the Data Lakehouse, which in some ways, brings components of what I outlined in the first post around my desires for a new database system to life. In this post, I am going to make an attempt to describe a roll-up of some recent big data developments that you should be aware of.
Let’s start with the lowest laye...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-3-catching-up-with-the-latest-big-data-developments/
Article: Taking Inventory – Where Do We Stand With AI and ML in Cyber Security? - published over 3 years ago.
Content: Before diving into cyber security and how the industry is using AI at this point, let’s define the term AI first. Artificial Intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including Deep Learning, and unsupervised), as well as other algorithmic approaches that are more than just simple statisti...
https://raffy.ch/blog/2021/05/19/taking-inventory-where-do-we-stand-with-ai-and-ml-in-cyber-security/
Article: A Logging History Lesson – From syslogd(8) to XDR - published over 3 years ago.
Content: The log management and security information management (SIEM) space have gone through a number of stages to arrive where they are today. I started mapping the space in the 1980’s when syslog entered the world. To make sense of the really busy diagram, the top shows the chronological timeline (not in equidistant notation!), the second swim lane underneath cal...
https://raffy.ch/blog/2021/06/08/a-logging-history-lesson-from-syslogd8-to-xdr/
Article: How To Drive Value with Security Data – The Full Talk - published over 3 years ago.
Content: Last week I keynoted LogPoint’s customer conference with a talk about how to extract value from security data. Pretty much every company out there has tried to somehow leverage their log data to manage their infrastructure and protect their assets and information. The solution vendors have initially named the space log management and then security informatio...
https://raffy.ch/blog/2021/06/12/how-to-drive-value-with-security-data-the-full-talk/
Article: The Data Lakehouse Post 2 – The Data Lakehouse Itself - published almost 4 years ago.
Content: In my previous blog post, I ranted a little about database technologies and threw a few thoughts out there on what I think a better data system would be able to do. In this post, I am going to talk a bit about the concept of the Data Lakehouse.
The term ‘data lakehouse‘ has been making the rounds in the data and analytics space for a couple of years. It d...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-2-the-data-lakehouse-itself/
Article: The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments - published almost 4 years ago.
Content: I recently wrote a post about the concept of the Data Lakehouse, which in some ways, brings components of what I outlined in the first post around my desires for a new database system to life. In this post, I am going to make an attempt to describe a roll-up of some recent big data developments that you should be aware of.
Let’s start with the lowest laye...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-3-catching-up-with-the-latest-big-data-developments/
Article: A Security Product Reference Model - published over 3 years ago.
Content: On a recent consulting engagement with Cynergy Partners, we needed to decipher the security product market to an investment firm that normally doesn’t invest in cyber security. One of the investor’s concerns was that a lot of cyber companies are short-lived businesses due to the threats changing so drastically quick. One day it’s ransomware X, the next day i...
https://raffy.ch/blog/2021/04/16/a-security-product-reference-model/
Article: Taking Inventory – Where Do We Stand With AI and ML in Cyber Security? - published over 3 years ago.
Content: Before diving into cyber security and how the industry is using AI at this point, let’s define the term AI first. Artificial Intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including Deep Learning, and unsupervised), as well as other algorithmic approaches that are more than just simple statisti...
https://raffy.ch/blog/2021/05/19/taking-inventory-where-do-we-stand-with-ai-and-ml-in-cyber-security/
Article: How To Drive Value with Security Data - published over 3 years ago.
Content: We have been collecting data to drive security insights for over two decades. We call these tools log management solutions, SIMs (security information management), and XDRs (extended detection and response) platforms. Some companies have also built their own solutions on top of big data technologies. It’s been quite the journey.
At the upcoming ThinkIn co...
https://raffy.ch/blog/2021/06/03/how-to-drive-value-with-security-data/
Article: A Logging History Lesson – From syslogd(8) to XDR - published over 3 years ago.
Content: The log management and security information management (SIEM) space have gone through a number of stages to arrive where they are today. I started mapping the space in the 1980’s when syslog entered the world. To make sense of the really busy diagram, the top shows the chronological timeline (not in equidistant notation!), the second swim lane underneath cal...
https://raffy.ch/blog/2021/06/08/a-logging-history-lesson-from-syslogd8-to-xdr/
Article: How To Drive Value with Security Data – The Full Talk - published over 3 years ago.
Content: Last week I keynoted LogPoint’s customer conference with a talk about how to extract value from security data. Pretty much every company out there has tried to somehow leverage their log data to manage their infrastructure and protect their assets and information. The solution vendors have initially named the space log management and then security informatio...
https://raffy.ch/blog/2021/06/12/how-to-drive-value-with-security-data-the-full-talk/
Article: *NIX Command Line Foo - published almost 2 years ago.
Content: Well, not one of my normal blog posts, but I hope some of you geeks out there will find this useful anyways. I will definitely use this post as a reference frequently.
I have been using various flavors of UNIX and their command lines from ksh to bash and zsh for over 25 years and there is always something new to learn to make me faster at the jobs I am do...
https://raffy.ch/blog/2022/11/27/nix-command-line-foo/
Article: How To Drive Value with Security Data – The Full Talk - published over 3 years ago.
Content: Last week I keynoted LogPoint’s customer conference with a talk about how to extract value from security data. Pretty much every company out there has tried to somehow leverage their log data to manage their infrastructure and protect their assets and information. The solution vendors have initially named the space log management and then security informatio...
https://raffy.ch/blog/2021/06/12/how-to-drive-value-with-security-data-the-full-talk/
Article: A Logging History Lesson – From syslogd(8) to XDR - published over 3 years ago.
Content: The log management and security information management (SIEM) space have gone through a number of stages to arrive where they are today. I started mapping the space in the 1980’s when syslog entered the world. To make sense of the really busy diagram, the top shows the chronological timeline (not in equidistant notation!), the second swim lane underneath cal...
https://raffy.ch/blog/2021/06/08/a-logging-history-lesson-from-syslogd8-to-xdr/
Article: No Really – What’s AI? - published over 4 years ago.
Content:
Last week I was speaking on a panel about the “Use of AI for Cybersecurity” at the Intelligence and National Security Alliance (INSA) conference on “Building an AI Powered Intelligence Community”. It was fascinating to listen to some of the panels with people from the Hill talking about AI. I was specifically impressed with the really educated views on i...
https://raffy.ch/blog/2020/03/09/no-really-whats-ai/
Article: Use of AI for Cyber Security in the Intelligence Community - published over 4 years ago.
Content:
This post is about capturing my talking points from the recent conference panel on the “Use of AI for Cybersecurity” at the Intelligence and National Security Alliance (INSA) conference. You can find my musings on the term AI in my previous blog post.
Building an AI Powered Intelligence Community (Click image for video)
Here is the list of topics I inje...
https://raffy.ch/blog/2020/03/16/use-of-ai-for-cyber-security-in-the-intelligence-community/
Article: The Data Lakehouse Post 1 – My Database Wishlist – A Rant - published almost 4 years ago.
Content: In 2015, I wrote a book about the Security Data Lake. At the time, the big data space was not as mature as today and especially the intersection of big data and security wasn’t a well understood area. Fast forward to today, people are talking about to the “Data Lakehouse“. A new concept that has been made possible by new database technologies, projects, and ...
https://raffy.ch/blog/2021/02/02/the-data-lakehouse-post-1-my-database-wishlist-a-rant/
Article: The Data Lakehouse Post 2 – The Data Lakehouse Itself - published almost 4 years ago.
Content: In my previous blog post, I ranted a little about database technologies and threw a few thoughts out there on what I think a better data system would be able to do. In this post, I am going to talk a bit about the concept of the Data Lakehouse.
The term ‘data lakehouse‘ has been making the rounds in the data and analytics space for a couple of years. It d...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-2-the-data-lakehouse-itself/
Article: The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments - published almost 4 years ago.
Content: I recently wrote a post about the concept of the Data Lakehouse, which in some ways, brings components of what I outlined in the first post around my desires for a new database system to life. In this post, I am going to make an attempt to describe a roll-up of some recent big data developments that you should be aware of.
Let’s start with the lowest laye...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-3-catching-up-with-the-latest-big-data-developments/
Article: 2021 Cyber Security Focus: “Unbound” - published over 3 years ago.
Content: It’s already early March and the year is in full swing. Covid is still raging and we have been seeing some crazy weather patterns, especially in the south of the United States. While snowed in here in Texas, I took some time to reflect on what’s driving cyber security spend and customer focus this year. Overall, we can summarize the 2021 trends under the ter...
https://raffy.ch/blog/2021/03/03/2021-cyber-security-focus-unbound/
Article: Asset Management – Back To The Roots - published over 3 years ago.
Content: Asset management is one of the core components of many successful security programs. I am an advisor to Panaseer, a startup in the continuous compliance management space. I recently co-authored a blog post on my favorite security metric that is related to asset management:
How many assets are in the environment?
A simple number. A number that tells a c...
https://raffy.ch/blog/2021/03/31/asset-management-back-to-the-roots/
Article: A Security Product Reference Model - published over 3 years ago.
Content: On a recent consulting engagement with Cynergy Partners, we needed to decipher the security product market to an investment firm that normally doesn’t invest in cyber security. One of the investor’s concerns was that a lot of cyber companies are short-lived businesses due to the threats changing so drastically quick. One day it’s ransomware X, the next day i...
https://raffy.ch/blog/2021/04/16/a-security-product-reference-model/
Article: Taking Inventory – Where Do We Stand With AI and ML in Cyber Security? - published over 3 years ago.
Content: Before diving into cyber security and how the industry is using AI at this point, let’s define the term AI first. Artificial Intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including Deep Learning, and unsupervised), as well as other algorithmic approaches that are more than just simple statisti...
https://raffy.ch/blog/2021/05/19/taking-inventory-where-do-we-stand-with-ai-and-ml-in-cyber-security/
Article: How To Drive Value with Security Data - published over 3 years ago.
Content: We have been collecting data to drive security insights for over two decades. We call these tools log management solutions, SIMs (security information management), and XDRs (extended detection and response) platforms. Some companies have also built their own solutions on top of big data technologies. It’s been quite the journey.
At the upcoming ThinkIn co...
https://raffy.ch/blog/2021/06/03/how-to-drive-value-with-security-data/