Databricks Data Lakehouse vs. a Data Warehouse: What’s the Difference? Read Our Latest Blog...
Databricks Data Lakehouse vs. a Data Warehouse: What’s the Difference? Read Our Latest Blog...
Start Free Trial

ChaosSearch Blog

David Bunting
FOLLOW ME ON:

About David Bunting

David Bunting is the Director of Demand Generation at ChaosSearch, the cloud data platform simplifying log analysis, cloud-native security, and application insights. Since 2019 David has worked tirelessly to bring ChaosSearch’s revolutionary technology to engineering teams, garnering the company such accolades as the Data Breakthrough Award and Cybersecurity Excellence Award. A veteran of LogMeIn and OutSystems, David has spent 20 years creating revenue growth and developing teams for SaaS and PaaS solutions.

Articles by David Bunting

11 MIN READ

The Power of Combining a Modular Security Data Lake with an XDR

By David Bunting on Aug 2, 2024

The 2024 Global Digital Trust Insights survey from PwC reports that 36% of businesses...

TOPIC

8 MIN READ

The Top 5 Security Logging Best Practices to Follow Now

By David Bunting on Jul 18, 2024

Security logging is a critical part of modern cybersecurity, providing the foundation for...

9 MIN READ

How to Quickly Analyze CloudFront Cloud Logs in Amazon S3

By David Bunting on Jul 11, 2024

Content delivery networks (CDNs) such as Amazon CloudFront generate a flood of log files. In...

13 MIN READ

What is the Future of Apache Spark in Big Data Analytics?

By David Bunting on Jul 4, 2024

Started in 2009 as a research project at UC Berkeley, Apache Spark transformed how data scientists...

11 MIN READ

Improving Patch and Vulnerability Management with Proactive Security Analysis

By David Bunting on Jul 1, 2024

Vulnerability management is the continuous process of identifying and addressing vulnerabilities in...

8 MIN READ

Innovating Security with Managed Detection & Response (MDR) and ChaosSearch

By David Bunting on Jun 20, 2024
{% module_block module "widget_92941ff6-fad9-492e-ad31-f3021454c1f8" %}{% module_attribute...
8 MIN READ

5 Security Logging and Monitoring Mistakes to Avoid

By David Bunting on Jun 13, 2024

As cybersecurity attack vectors evolve, security logging and monitoring are becoming even more...

Subscribe to Our Blog