RESOURCES
Blogs
[{"id":4330,"link":"https:\/\/www.query.ai\/resources\/blogs\/customer-success-investigating-critical-cloud-vulnerabilities\/","name":"customer-success-investigating-critical-cloud-vulnerabilities","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/09\/2025-09-04_Cloud-Vulnerabilities.png","alt":"investigate cloud vulnerabilities blog header"},"title":"Customer Success Stories: Investigating Critical Vulnerabilities in Cloud Infrastructure","author":{"name":"Dhiraj Sharan","link":"https:\/\/www.query.ai\/resources\/author\/dhiraj\/"},"date":"Sep 04, 2025","dateGMT":"2025-09-04 14:43:02","modifiedDate":"2025-09-04 11:16:56","modifiedDateGMT":"2025-09-04 15:16:56","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":46},"status":"publish","content":"Investigating vulnerabilities is painful yet absolutely essential work that the security team regularly does. Doing it manually quickly becomes overwhelming,"},{"id":4231,"link":"https:\/\/www.query.ai\/resources\/blogs\/security-data-mesh-federated-search\/","name":"security-data-mesh-federated-search","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/08\/2025-08-12_Sentinel-Data-Lake.png","alt":"sentinel data lake blog header"},"title":"How To Navigate in the Era of Fast-Evolving Security Data Lakes","author":{"name":"Dhiraj Sharan","link":"https:\/\/www.query.ai\/resources\/author\/dhiraj\/"},"date":"Aug 12, 2025","dateGMT":"2025-08-12 14:03:59","modifiedDate":"2025-08-15 03:41:28","modifiedDateGMT":"2025-08-15 07:41:28","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":5,"sec":7},"status":"publish","content":"A few days back, Microsoft made big news across the cybersecurity landscape: Sentinel now has a built-in Data Lake \u2014"},{"id":4185,"link":"https:\/\/www.query.ai\/resources\/blogs\/security-data-pipelines-modern-data-storage\/","name":"security-data-pipelines-modern-data-storage","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/08\/2025-08-04_write-to-gold.png","alt":"write data to gold blog header"},"title":"Write to Gold with Query Security Data Pipelines","author":{"name":"Jonathan Rau","link":"https:\/\/www.query.ai\/resources\/author\/j-rau\/"},"date":"Aug 03, 2025","dateGMT":"2025-08-03 18:45:57","modifiedDate":"2025-08-03 23:09:57","modifiedDateGMT":"2025-08-04 03:09:57","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":9,"sec":39},"status":"publish","content":"Introduction How do all of these self-congratulating posts start, again? Oh right, \u201cin the ever-changing security threat bad guy landscape,"},{"id":4182,"link":"https:\/\/www.query.ai\/resources\/blogs\/query-agents-and-security-data-pipelines-launch\/","name":"query-agents-and-security-data-pipelines-launch","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/08\/2025-08-04_query-agents-pipelines-launch.png","alt":"query agents and pipelines launch blog header"},"title":"Announcing Query Security Data Pipelines and Query Agents","author":{"name":"Matt Eberhart","link":"https:\/\/www.query.ai\/resources\/author\/matt\/"},"date":"Aug 03, 2025","dateGMT":"2025-08-03 18:36:21","modifiedDate":"2025-08-04 10:23:11","modifiedDateGMT":"2025-08-04 14:23:11","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":4,"sec":21},"status":"publish","content":"Working side-by-side with some of the most data-forward security teams in the world, I am excited to share that Query"},{"id":4129,"link":"https:\/\/www.query.ai\/resources\/blogs\/file%e2%80%91hash%e2%80%91search%e2%80%91agent\/","name":"file%e2%80%91hash%e2%80%91search%e2%80%91agent","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/07\/2025-07-31_Use-Case-Agents-p6.png","alt":"query file hash search agent blog header"},"title":"From Hunt to Verdict: Automating IOC Sweeps with the File Hash Search Agent","author":{"name":"Neal Bridges","link":"https:\/\/www.query.ai\/resources\/author\/nealquery-ai\/"},"date":"Jul 30, 2025","dateGMT":"2025-07-30 14:25:30","modifiedDate":"2025-07-30 10:25:32","modifiedDateGMT":"2025-07-30 14:25:32","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":7,"sec":33},"status":"publish","content":"This is blog #6 in a series of 6 discussing AI Agents, the Query Security Data Mesh, and why normalized"},{"id":4127,"link":"https:\/\/www.query.ai\/resources\/blogs\/azure-data-explorer-integration-query-federated-search\/","name":"azure-data-explorer-integration-query-federated-search","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/07\/2025-07-30_Query-ADX.png","alt":"query adx integration blog header"},"title":"Product Update: Query Federated Search integrated with Azure Data Explorer","author":{"name":"Jonathan Rau","link":"https:\/\/www.query.ai\/resources\/author\/j-rau\/"},"date":"Jul 29, 2025","dateGMT":"2025-07-29 19:57:54","modifiedDate":"2025-07-29 15:59:17","modifiedDateGMT":"2025-07-29 19:59:17","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":5,"sec":8},"status":"publish","content":"Introduction Azure Data Explorer (ADX) in an interactive, fully managed Exploratory Data Analysis (EDA) platform hosted on the Microsoft Azure"},{"id":4125,"link":"https:\/\/www.query.ai\/resources\/blogs\/federated-search-forticnapp-integration\/","name":"federated-search-forticnapp-integration","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/07\/2025-07-30_Query-Lacework.png","alt":"Query Lacework integration blog header"},"title":"Product Update: Query Federated Search integrated with FortiCNAPP","author":{"name":"Jonathan Rau","link":"https:\/\/www.query.ai\/resources\/author\/j-rau\/"},"date":"Jul 29, 2025","dateGMT":"2025-07-29 19:41:47","modifiedDate":"2025-07-30 09:16:15","modifiedDateGMT":"2025-07-30 13:16:15","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":5,"sec":10},"status":"publish","content":"Introduction The Cloud Native Application Protection Platform (CNAPP) category represents a consolidation of the cloud security space. Namely, Cloud Security"},{"id":4122,"link":"https:\/\/www.query.ai\/resources\/blogs\/asset-info-agent\/","name":"asset-info-agent","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/07\/2025-07-29_Use-Case-Agents-p5.png","alt":"query asset info agent blog header"},"title":"The Asset Info Agent: From Inventory to Intelligence","author":{"name":"Neal Bridges","link":"https:\/\/www.query.ai\/resources\/author\/nealquery-ai\/"},"date":"Jul 28, 2025","dateGMT":"2025-07-28 21:07:40","modifiedDate":"2025-07-28 17:07:42","modifiedDateGMT":"2025-07-28 21:07:42","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":37},"status":"publish","content":"This is blog #5 in a series of 6 discussing AI Agents, the Query Security Data Mesh, and why normalized"},{"id":4116,"link":"https:\/\/www.query.ai\/resources\/blogs\/network-activity-info-agent-federated-search\/","name":"network-activity-info-agent-federated-search","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/07\/2025-07-24_Use-Case-Agents-p4.png","alt":"query network activity agent blog header"},"title":"From Noise to Signal: Contextualizing Network Data with Query Agents and Federated Search","author":{"name":"Neal Bridges","link":"https:\/\/www.query.ai\/resources\/author\/nealquery-ai\/"},"date":"Jul 24, 2025","dateGMT":"2025-07-24 13:50:34","modifiedDate":"2025-07-24 11:17:30","modifiedDateGMT":"2025-07-24 15:17:30","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":9,"sec":49},"status":"publish","content":"This is blog #4 in a series of 6 discussing AI Agents, the Query Security Data Mesh, and why normalized"}]