is everywhere.
(And we plug into Splunk.)


Resources
[{"id":4385,"link":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/09\/QWP-05_Query-Absolute-Beginners-Guide-to-OCSF.pdf#new_tab","name":"absolute-beginners-guide-to-ocsf","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/09\/2025-09-24_OCSF-Beginners-Guide_WP2.png","alt":"beginners guide to ocsf white paper thumbnail"},"title":"Absolute Beginners Guide to OCSF","author":{"name":"Aurora Starita","link":"https:\/\/www.query.ai\/resources\/author\/aurora-starita\/"},"date":"Sep 24, 2025","dateGMT":"2025-09-24 14:54:45","modifiedDate":"2025-09-24 15:20:18","modifiedDateGMT":"2025-09-24 19:20:18","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/white-papers\/\" rel=\"category tag\">White Papers<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/white-papers\/\" rel=\"category tag\">White Papers<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":8},"status":"publish","excerpt":"Learn how to measure and optimize your cybersecurity investigation costs by quantifying your analysts' searches per investigation (ASPI)..."},{"id":4369,"link":"https:\/\/www.query.ai\/resources\/blogs\/investigate-dns-data-in-splunk\/","name":"investigate-dns-data-in-splunk","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/09\/2025-09-23_DNS-Investigation-Splunk.png","alt":"query splunk dns investigations"},"title":"Customer Success Stories: DNS Data Investigation From Splunk, While Reducing Costs","author":{"name":"Dhiraj Sharan","link":"https:\/\/www.query.ai\/resources\/author\/dhiraj\/"},"date":"Sep 23, 2025","dateGMT":"2025-09-23 14:32:04","modifiedDate":"2025-09-23 12:03:52","modifiedDateGMT":"2025-09-23 16:03:52","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":8,"sec":34},"status":"publish","excerpt":""},{"id":4347,"link":"https:\/\/www.query.ai\/resources\/blogs\/the-data-advantage-security-data-mesh\/","name":"the-data-advantage-security-data-mesh","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/09\/2025-09-11_security-data-mesh-soc.png","alt":"security data mesh soc blog header"},"title":"The Data Advantage: Why a Security Data Mesh Is the Foundation for Modern SOCs","author":{"name":"Jonathan Rau","link":"https:\/\/www.query.ai\/resources\/author\/j-rau\/"},"date":"Sep 11, 2025","dateGMT":"2025-09-11 14:51:08","modifiedDate":"2025-09-11 10:51:08","modifiedDateGMT":"2025-09-11 14:51:08","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":17,"sec":13},"status":"publish","excerpt":""},{"id":4340,"link":"https:\/\/www.query.ai\/resources\/blogs\/splunk-snowflake-federated-search\/","name":"splunk-snowflake-federated-search","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/09\/2025-09-10_Splunk-Snowflake-Federated-Search.png","alt":"splunk snowflake federated search"},"title":"Federated Search from Splunk to Snowflake (and More)","author":{"name":"Jonathan Rau","link":"https:\/\/www.query.ai\/resources\/author\/j-rau\/"},"date":"Sep 10, 2025","dateGMT":"2025-09-10 15:02:22","modifiedDate":"2025-09-11 10:15:05","modifiedDateGMT":"2025-09-11 14:15:05","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":10,"sec":45},"status":"publish","excerpt":""},{"id":4330,"link":"https:\/\/www.query.ai\/resources\/blogs\/customer-success-investigating-critical-cloud-vulnerabilities\/","name":"customer-success-investigating-critical-cloud-vulnerabilities","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/09\/2025-09-04_Cloud-Vulnerabilities.png","alt":"investigate cloud vulnerabilities blog header"},"title":"Customer Success Stories: Investigating Critical Vulnerabilities in Cloud Infrastructure","author":{"name":"Dhiraj Sharan","link":"https:\/\/www.query.ai\/resources\/author\/dhiraj\/"},"date":"Sep 4, 2025","dateGMT":"2025-09-04 14:43:02","modifiedDate":"2025-09-04 11:16:56","modifiedDateGMT":"2025-09-04 15:16:56","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":46},"status":"publish","excerpt":""},{"id":4240,"link":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/08\/2025-08-14_Best-Practices-for-Security-Data-Pipelines.pdf#new_tab","name":"best-practices-for-security-data-pipelines","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/08\/2025-08-14_Security-Data-Pipelines-White-Paper.png","alt":"query security data pipelines white paper"},"title":"Best Practices for Security Data Pipelines","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Aug 14, 2025","dateGMT":"2025-08-14 15:13:20","modifiedDate":"2025-08-15 03:51:25","modifiedDateGMT":"2025-08-15 07:51:25","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/white-papers\/\" rel=\"category tag\">White Papers<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/white-papers\/\" rel=\"category tag\">White Papers<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":10},"status":"publish","excerpt":"Learn how to measure and optimize your cybersecurity investigation costs by quantifying your analysts' searches per investigation (ASPI)..."},{"id":4231,"link":"https:\/\/www.query.ai\/resources\/blogs\/security-data-mesh-federated-search\/","name":"security-data-mesh-federated-search","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/08\/2025-08-12_Sentinel-Data-Lake.png","alt":"sentinel data lake blog header"},"title":"How To Navigate in the Era of Fast-Evolving Security Data Lakes","author":{"name":"Dhiraj Sharan","link":"https:\/\/www.query.ai\/resources\/author\/dhiraj\/"},"date":"Aug 12, 2025","dateGMT":"2025-08-12 14:03:59","modifiedDate":"2025-08-15 03:41:28","modifiedDateGMT":"2025-08-15 07:41:28","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":5,"sec":7},"status":"publish","excerpt":""},{"id":4214,"link":"https:\/\/www.einpresswire.com\/article\/836291861\/query-ai-launches-agents-and-data-pipelines-to-cut-through-security-data-chaos#new_tab","name":"query-launches-agents-pipelines","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/08\/query-agents-and-pipelines-launch-blog.png","alt":"query agents and pipelines blog"},"title":"Query.ai Launches Agents and Data Pipelines to Cut Through Security Data Chaos","author":{"name":"Query","link":"https:\/\/www.query.ai\/resources\/author\/query\/"},"date":"Aug 4, 2025","dateGMT":"2025-08-04 14:18:40","modifiedDate":"2025-08-04 10:18:42","modifiedDateGMT":"2025-08-04 14:18:42","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/newsroom\/\" rel=\"category tag\">Newsroom<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/newsroom\/\" rel=\"category tag\">Newsroom<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":0},"status":"publish","excerpt":""},{"id":4185,"link":"https:\/\/www.query.ai\/resources\/blogs\/security-data-pipelines-modern-data-storage\/","name":"security-data-pipelines-modern-data-storage","thumbnail":{"url":"https:\/\/www.query.ai\/wp-content\/uploads\/2025\/08\/2025-08-04_write-to-gold.png","alt":"write data to gold blog header"},"title":"Write to Gold with Query Security Data Pipelines","author":{"name":"Jonathan Rau","link":"https:\/\/www.query.ai\/resources\/author\/j-rau\/"},"date":"Aug 3, 2025","dateGMT":"2025-08-03 18:45:57","modifiedDate":"2025-08-03 23:09:57","modifiedDateGMT":"2025-08-04 03:09:57","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>","space":"<a href=\"https:\/\/www.query.ai\/resources\/category\/blogs\/\" rel=\"category tag\">Blogs<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":9,"sec":39},"status":"publish","excerpt":""}]