2 Comments
User's avatar
Subhankar Biswas's avatar

This really resonates! Love how you framed the gap between data engineering and cybersecurity, not just tooling, but culture and evidence-based practices.

The “modern data stack” principles you highlight, separation of storage and compute, modular components, open formats, make me rethink how I approach security data in my own work.

Expand full comment
Jeremy Wiley's avatar

That's awesome, thanks for the feedback! I honestly assumed my first comment on here would just be 'first!'

Expand full comment