query logo white
  • Query logo
  • Products
    • Query Federated Search
    • Query Federated Search for Splunk
    • Federated Detections
    • AI Agents
    • Security Data Pipelines
  • Platform
    • The Future is Federated
    • Federated Search
    • Connectors
    • Documentation
  • Use Cases
    • Compliance
    • Incident Response
    • Security Investigations
    • SIEM Migration
    • Splunk Cost Reduction
    • Threat Hunting
    • Examples
      • Amazon Security Lake
      • CrowdStrike/S3
      • EDR Data
  • Resources
    • Blogs
    • Datasheets
    • Events
    • Newsroom
    • Videos
    • Webinars
    • White Papers
  • Company
    • About Us
    • Partners
      • Splunk Services Partner Program
    • Leadership
    • Board of Directors
    • Careers
  • Book a Demo

Author: Dhiraj Sharan

Chief Scientist & Founder, Query

Blogs

Zero-Days at Scale: What Claude Mythos means for your security investigation workflow

April 21, 2026 / April 21, 2026 by Dhiraj Sharan | Leave a Comment

A reckoning for the cyber industry On April 7, 2026, Anthropic released a technical assessment (see here) that would send chills down every cybersecurity professional – their newest model, Claude Mythos Preview, can perform cybersecurity tasks autonomously, at scale, and with a level of sophistication that eclipses anything that was possible earlier. In one example, […]

Read more »

Blogs

SIEM Migration or Migraine? The Query Prescription for a Methodical Modernization

April 9, 2026 / April 8, 2026 by Dhiraj Sharan | Leave a Comment

A common topic in every CISO and their architects’ mind is effective ways to migrate from their legacy SIEM. SIEM migration isn’t simply a move from one vendor stack to another. Its goal is closely tied to the organization’s infrastructure upgrade and transformation of their security data architecture. Legacy ingestion-centric SIEMs were designed for a […]

Read more »

Blogs

Product Release: Announcing Query Splunk App 3.0

February 16, 2026 / February 16, 2026 by Dhiraj Sharan | Leave a Comment

More AI. More Analytics. Powered by the Security Data Mesh. Security teams are under pressure to move faster without waiting to move more and more data. Today, we’re excited to announce Query Splunk App 3.0, a major step forward in how security teams investigate, analyze, and operationalize data across a federated security data mesh. This […]

Read more »

Blogs

Five SIEM and Security Data Predictions for 2026

January 26, 2026 / January 26, 2026 by Dhiraj Sharan | Leave a Comment

AI, SecDataOps, and federation are some of the primary forces that will continue to reshape security operations in the years to come. What specifically should we expect in 2026? We are still in January so I wanted to squeeze in my predictions for 2026 in the areas of my expertise! As we look toward 2026, […]

Read more »

Blogs

Journey from Federated Search to Knowledge: Centralize the knowledge, not the data

January 12, 2026 / January 12, 2026 by Dhiraj Sharan | Leave a Comment

2026 has dawned. The holiday break gave me the chance to reflect on the journey we are on at Query and the steps forward we’ll take in 2026. (In retrospect, the steps we took in 2025 are captured in this blog from my colleague Mike Bousquet.) In the past few years, the industry, Query included, […]

Read more »

Blogs

Customer Success Story: How this enterprise used Splunk to investigate Microsoft sources, leveraging Query

December 17, 2025 / December 17, 2025 by Dhiraj Sharan | Leave a Comment

Introduction Security teams running large Microsoft-centric environments depend heavily on telemetry from Defender for Endpoint (MDE), Defender for Office 365, and other Defender products (for Cloud Apps, Identity, IOT, Servers, Vulnerability Management). These customers often collect logs in Azure Log Analytics (ALA) directly or via Microsoft Sentinel, and use Azure Data Explorer (ADX) for low-cost […]

Read more »

Investigating using archived CrowdStrike telemetry stored in Amazon S3

Blogs

Customer Success Story: Investigating using archived CrowdStrike telemetry stored in Amazon S3

December 15, 2025 / December 17, 2025 by Dhiraj Sharan | Leave a Comment

Introduction As organizations continue to rely on endpoint detection and response (EDR) tools like CrowdStrike Falcon for deep visibility into endpoint activity, they quickly face the challenge of storing and analyzing the massive volumes of telemetry these tools generate. Many security teams depend on Splunk for investigation and detection, but the high cost of indexing […]

Read more »

Splunk to Amazon Security Lake transition blog

Blogs

Customer Success Story: How This Enterprise Is Transitioning From Splunk to Amazon Security Lake Leveraging Query

December 4, 2025 / December 4, 2025 by Dhiraj Sharan | Leave a Comment

Introduction In an era where cloud environments expand ever faster and security telemetry grows exponentially, enterprise security teams face a paradox: more data means more potential insight, but also more SIEM costs! In this customer success story, we talk about a forward-looking global organization using Splunk as their SIEM, facing this challenge, and how they […]

Read more »

splunk snowflake query blog header

Blogs

Customer Success Story: How One Enterprise Connected Splunk and Snowflake with Query

November 4, 2025 / November 4, 2025 by Dhiraj Sharan | Leave a Comment

Over the last few years, the Snowflake AI Data Cloud has become an increasingly common data lake platform for cybersecurity data. Security analysts are typically most comfortable operating in their traditional SIEM (which is frequently Splunk). As Snowflake has gained adoption as a destination for security data, analysts find themselves pivoting from Splunk to Snowflake […]

Read more »

OODA Loop Federated Search blog header

Blogs

Implementing a Fast Investigation OODA Loop Using Security Data Mesh

October 22, 2025 / October 22, 2025 by Dhiraj Sharan | Leave a Comment

I had the fortune of discussing the security investigation process with Neal Bridges, our CISO, who is also a very hands-on security analyst. Since he is also an Air Force veteran, he loves to apply the OODA loop learnt from his military days to his investigation process. Applying the OODA loop to decision making in […]

Read more »

Page navigation
  • Current Page 1
  • Page 2
  • Page 3
  • ›
  • »
COMPANY

Product

About

Careers

Partners

Leadership

Board of Directors

RESOURCES

Documentation

Blogs

Events

Newsroom

Videos

Webinars

White Papers

LEGAL

BETA Terms

Data Processing Agreement

Privacy & Cookie Policy

Security Protocols

Service Level Agreement

Subprocessors

Support Agreement

Terms and Conditions

CONTACT

Book a Demo

Contact Sales

query on linkedinquery on Xquery on youtube


Query

3423 Piedmont Road NE
• Atlanta, GA 30305
©2025 Query, All Rights Reserved.