{"id":54855,"date":"2025-08-21T13:18:06","date_gmt":"2025-08-21T21:18:06","guid":{"rendered":"https:\/\/www.sumologic.com\/resources\/ep-6-sicherheitsparadies-oder-horrorgeschichte-von-siems-zu-lakes-und-lakehouses"},"modified":"2025-11-30T19:45:14","modified_gmt":"2025-12-01T03:45:14","slug":"ep-6-security-haven-or-horror-story-from-siems-to-lakes-to-lakehouses","status":"publish","type":"resource","link":"https:\/\/www.sumologic.com\/de\/podcast\/ep-6-security-haven-horror-story-from-siems-to-lakes-to-lakehouses","title":{"rendered":"Folge 6: Sicherheitsparadies oder Horrorstory: von SIEMs zu Lakes und Lakehouses"},"content":{"rendered":"\n<p>Zwischen SIEMs, Data Lakes und Data Lakehouses gibt es so viele Schlagworte, dass man damit ein ganzes Glossar f\u00fcllen k\u00f6nnte. In dieser Folge erl\u00e4utern Adam und David die wirklichen Unterschiede zwischen Data Lakes und SIEM-Systemen und warum die effektive Verwaltung all dieser Daten entscheidend ist, um sichtbar und sicher zu bleiben. Sie gehen auch darauf ein, wie KI das Spiel aufmischt und warum die Auswahl der richtigen Tools den Unterschied zwischen \u00dcberforderung und Kontrolle ausmachen kann.<\/p>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zwischen SIEMs, Data Lakes und Data Lakehouses gibt es so viele Schlagworte, dass man damit ein ganzes Glossar f\u00fcllen k\u00f6nnte. In dieser Folge erl\u00e4utern Adam und David die wirklichen Unterschiede zwischen Data Lakes und SIEM-Systemen und warum die effektive Verwaltung all dieser Daten entscheidend ist, um sichtbar und sicher zu bleiben. Sie gehen auch darauf [&hellip;]<\/p>\n","protected":false},"author":372,"featured_media":50571,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"< 1","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"resource-type":[308],"resource-solution":[306],"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false},"resource-type":[308],"resource-solution":[306],"class_list":["post-54855","resource","type-resource","status-publish","has-post-thumbnail","hentry","resource-type-podcast","resource-solution-secops-and-security-de"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/resource\/54855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/users\/372"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media\/50571"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media?parent=54855"}],"wp:term":[{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/resource-type?post=54855"},{"taxonomy":"resource-solution","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/resource-solution?post=54855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}