RESOURCES

Blogs


		[{"id":4862,"link":"https:\/\/www.query.ai\/resources\/blogs\/zero-days-with-mythos\/","name":"zero-days-with-mythos","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2026\/04\/glasswing-blog.png","alt":""},"title":"Zero-Days at Scale: What Claude Mythos means for your security investigation workflow","postMeta":[],"author":{"name":"Dhiraj Sharan","link":"https:\/\/www.query.ai\/resources\/author\/dhiraj\/"},"date":"Apr 21, 2026","dateGMT":"2026-04-21 07:52:00","modifiedDate":"2026-04-21 06:51:30","modifiedDateGMT":"2026-04-21 10:51:30","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":17,"sec":30},"status":"publish","content":"A reckoning for the cyber industry On April 7, 2026, Anthropic released a technical assessment (see here) that would send"},{"id":4860,"link":"https:\/\/www.query.ai\/resources\/blogs\/siem-migration-or-migraine-the-query-prescription\/","name":"siem-migration-or-migraine-the-query-prescription","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2026\/04\/SIEM-Migraine-Blog-Header-scaled.png","alt":""},"title":"SIEM Migration or Migraine? The Query Prescription for a Methodical Modernization","postMeta":[],"author":{"name":"Dhiraj Sharan","link":"https:\/\/www.query.ai\/resources\/author\/dhiraj\/"},"date":"Apr 09, 2026","dateGMT":"2026-04-09 11:19:00","modifiedDate":"2026-04-08 13:20:21","modifiedDateGMT":"2026-04-08 17:20:21","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":7,"sec":54},"status":"publish","content":"A common topic in every CISO and their architects\u2019 mind is effective ways to migrate from their legacy SIEM. SIEM"},{"id":4857,"link":"https:\/\/www.query.ai\/resources\/blogs\/show-your-work-ai-security\/","name":"show-your-work-ai-security","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2026\/04\/Show-Your-Work-Blog-Header.png","alt":""},"title":"Show Your Work.","postMeta":[],"author":{"name":"Matt Eberhart","link":"https:\/\/www.query.ai\/resources\/author\/matt\/"},"date":"Apr 07, 2026","dateGMT":"2026-04-07 09:22:00","modifiedDate":"2026-04-06 17:26:08","modifiedDateGMT":"2026-04-06 21:26:08","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":12,"sec":54},"status":"publish","content":"If Your AI Can't Prove How It Got There, It Doesn't Matter How Good It Is. One of our AI"},{"id":4852,"link":"https:\/\/www.query.ai\/resources\/blogs\/ai-agent-stack-upside-down-data-problem\/","name":"ai-agent-stack-upside-down-data-problem","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2026\/04\/Agent-Stack-Upside-Down-Blog-Header-scaled.png","alt":""},"title":"The AI Agent Stack Is Upside Down","postMeta":[],"author":{"name":"Matt Eberhart","link":"https:\/\/www.query.ai\/resources\/author\/matt\/"},"date":"Apr 02, 2026","dateGMT":"2026-04-02 13:00:00","modifiedDate":"2026-04-01 22:01:27","modifiedDateGMT":"2026-04-02 02:01:27","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":11,"sec":51},"status":"publish","content":"AI Agents Don't Have a Model Problem. They Have a Data Problem. Every major platform at RSAC this year is"},{"id":4833,"link":"https:\/\/www.query.ai\/resources\/blogs\/the-compounding-advantage-part4\/","name":"the-compounding-advantage-part4","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2026\/03\/Accelerate-SecOps-Blog-Header-scaled.png","alt":""},"title":"The Compounding Advantage","postMeta":[],"author":{"name":"Mike Bousquet","link":"https:\/\/www.query.ai\/resources\/author\/mike\/"},"date":"Mar 24, 2026","dateGMT":"2026-03-24 07:21:54","modifiedDate":"2026-03-27 15:11:36","modifiedDateGMT":"2026-03-27 19:11:36","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":7,"sec":32},"status":"publish","content":"Project Hail Query, Part 4 of 4 Part 1 | Part 2 | Part 3 | Part 4 This series"},{"id":4831,"link":"https:\/\/www.query.ai\/resources\/blogs\/query-workers-security-data-mesh-part3\/","name":"query-workers-security-data-mesh-part3","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2026\/03\/Dawning-of-the-Modern-SOC-Blog-Header-scaled.png","alt":""},"title":"Every Investigation Is a Hail Mary. We Built You a Rocky.","postMeta":[],"author":{"name":"Mike Bousquet","link":"https:\/\/www.query.ai\/resources\/author\/mike\/"},"date":"Mar 23, 2026","dateGMT":"2026-03-23 08:00:37","modifiedDate":"2026-03-24 03:30:12","modifiedDateGMT":"2026-03-24 07:30:12","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":11,"sec":18},"status":"publish","content":"Project Hail Query, Part 3 of 4 Part 1 | Part 2 | Part 3 | Part 4 Security operations"},{"id":4827,"link":"https:\/\/www.query.ai\/resources\/blogs\/security-is-a-data-problem-part2\/","name":"security-is-a-data-problem-part2","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2026\/03\/Break-Free-From-Legacy-Orbit-Blog-Header-scaled.png","alt":""},"title":"Security Is a Data Problem. The AI Wave Just Made That Impossible to Ignore.","postMeta":[],"author":{"name":"Mike Bousquet","link":"https:\/\/www.query.ai\/resources\/author\/mike\/"},"date":"Mar 19, 2026","dateGMT":"2026-03-19 09:14:00","modifiedDate":"2026-03-24 03:26:23","modifiedDateGMT":"2026-03-24 07:26:23","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":9,"sec":50},"status":"publish","content":"Project Hail Query, Part 2 of 4 Part 1 | Part 2 | Part 3 | Part 4 The AI"},{"id":4822,"link":"https:\/\/www.query.ai\/resources\/blogs\/assumption-nobody-questioned-part1\/","name":"assumption-nobody-questioned-part1","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2026\/03\/End-Centralized-Gravity-Blog-Header-scaled.png","alt":""},"title":"The Assumption Nobody Questioned","postMeta":[],"author":{"name":"Mike Bousquet","link":"https:\/\/www.query.ai\/resources\/author\/mike\/"},"date":"Mar 18, 2026","dateGMT":"2026-03-18 12:14:17","modifiedDate":"2026-03-24 03:27:16","modifiedDateGMT":"2026-03-24 07:27:16","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":7,"sec":45},"status":"publish","content":"Project Hail Query, Part 1 of 4 Part 1 | Part 2 | Part 3 | Part 4 The movie"},{"id":4819,"link":"https:\/\/www.query.ai\/resources\/blogs\/detection-triage-investigation-distributed-data\/","name":"detection-triage-investigation-distributed-data","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2026\/03\/Detect-and-Triage-scaled.png","alt":""},"title":"Detection Triage & Investigation Across Distributed Data","postMeta":[],"author":{"name":"Mike Bousquet","link":"https:\/\/www.query.ai\/resources\/author\/mike\/"},"date":"Mar 09, 2026","dateGMT":"2026-03-09 14:28:24","modifiedDate":"2026-03-09 10:28:26","modifiedDateGMT":"2026-03-09 14:28:26","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":21},"status":"publish","content":"When the Investigation Begins The first post in this series explored detection coverage and how it often ends up defined"}]