query logo white
  • Query logo
  • Products
    • Query Federated Search
    • Query Federated Search for Splunk
    • AI Agents
    • Security Data Pipelines
  • Platform
    • The Future is Federated
    • Federated Search
    • Connectors
    • Documentation
  • Use Cases
    • Incident Response
    • Security Investigations
    • SIEM Migration
    • Splunk Cost Reduction & Federation
    • Threat Hunting
    • Examples
      • Amazon Security Lake
      • CrowdStrike/S3
      • EDR Data
  • Resources
    • Blogs
    • Datasheets
    • Events
    • Newsroom
    • Videos
    • Webinars
    • White Papers
  • Company
    • About Us
    • Partners
      • Splunk Services Partner Program
    • Leadership
    • Board of Directors
    • Careers
  • Book a Demo

Author: Query

Simplifying Search
People looking at Laptop

Blogs

Network Security with Zeek (Bro)

August 12, 2020 / May 24, 2023 by Query

Zeek the new Bro Zeek is the new name for Bro that has been in existence since 1994. In this article, we will review what makes Zeek a powerful tool for network analysis and security monitoring. Need a little more familiarity with Zeek? Check out our previous blog:  Bro: Security’s Swiss Army Knife. A language […]

Read more »

Coins

Blogs

How to Use Autoencoder for Anomaly Detection

July 28, 2020 / March 22, 2023 by Query

In our previous blogs on Artificial Intelligence and Everyday Life, we learned the basics of how our computers can be trained to think like humans and work like them. Now let’s move on to some actual application of what we learned and understand about one of the most versatile neural network models – The Autoencoder. […]

Read more »

Book

Blogs

Natural Language Processing Dictionary

July 21, 2020 / February 16, 2023 by Query

Bag of WordsThe bag-of-words model is a simplifying representation technique wherein a text (such as a sentence or a document) is represented as the bag (multiset) of its words, disregarding grammar and even word order but keeping multiplicity. Bottom-up parserThe bottom-up parser has a parsing technique that starts bottom-up by grouping words into phrases, and […]

Read more »

Keyboard

Blogs

Bro: Security’s Swiss Army Knife

July 14, 2020 / February 16, 2023 by Query

A swiss army knife is a plethora of tools wrapped up into one friendly and compact system. When describing anything as a swiss army knife, we mean they have a wide range of uses, whether it be knowledge, applicability, adaptivity, or otherwise. Bro, the leading platform for network security monitoring, is quite an exciting ecosystem […]

Read more »

Boy looking at PC

Blogs

Hacker Tricks

June 30, 2020 / April 23, 2024 by Query

Looking for some top hacking techniques? Read about the most common ones below! Credit to Finjan.com, for more detail on this content see the original post: https://blog.finjan.com/9-common-hacking-techniques-and-how-to-deal-with-them/ While we just explored Anomaly Detection as one of the uses of this model, look for its other applications such as Dimensionality Reduction, Information Retrieval, and Machine Translation, […]

Read more »

Learn Highlighted

Blogs

Newfound Appreciation: Noam Chomsky

June 30, 2020 / March 22, 2023 by Query

We have all been there, sitting in class thinking to ourselves, “I will never use this in real life.” However, life has a way of proving us wrong. Enter Noam Chomsky As a computer science graduate, I took quite a bit of math and computing classes. One name that I heard over and over was […]

Read more »

Dashboard Image

Blogs

Understanding the Elastic Stack

June 16, 2020 / March 22, 2023 by Query

This blog will look into the entire Elastic Stack (Elasticsearch, Logstash, Kibana). What is Kibana? Kibana is the visualization layer of Elastic stack. With Kibana, you can create different types of charts, tables, histograms, and maps to understand and analyze your data better. You can also use Kibana to secure, monitor, and manage your elastic […]

Read more »

Eye Scanning

Blogs

Big Data and Cybersecurity

June 2, 2020 / March 22, 2023 by Query

Big data can provide numerous insights to enterprises and help professionals to make informed decisions. When used in cybersecurity, big data can find trends and correlations, flag anomalies, and recognize the malicious activity. However, malicious hackers are also benefiting.  As AI and machine learning find their way into the world of malicious cyber attacks, cybercriminals […]

Read more »

Digital Locks on keyboard

Blogs

How to Choose the Perfect Password

May 28, 2020 / February 16, 2023 by Query

The idea of an unhackable password is beyond the realm of possibility, but there are ways to protect yourself and make your password harder to guess than the average password. Cybersecurity professionals lay strict rules on not reusing passwords, picking long, complex ones, and making sure your passwords are safe because if there is a […]

Read more »

Newsroom

Enterprise Security Magazine: Top 10 AI Solutions

May 27, 2020 / December 24, 2022 by Query

Read more »

Page navigation
  • «
  • ‹
  • Page 23
  • Page 24
  • Current Page 25
  • Page 26
  • Page 27
  • ›
  • »
COMPANY

Product

About

Careers

Partners

Leadership

Board of Directors

RESOURCES

Documentation

Blogs

Events

Newsroom

Videos

Webinars

White Papers

LEGAL

BETA Terms

Data Processing Agreement

Privacy & Cookie Policy

Security Protocols

Service Level Agreement

Subprocessors

Support Agreement

Terms and Conditions

CONTACT

Book a Demo

Contact Sales

query on linkedinquery on Xquery on youtube


Query

3423 Piedmont Road NE
• Atlanta, GA 30305
©2025 Query, All Rights Reserved.