How important is it to store your SIEM logs in a tamper-proof database?
Introduction
Imagine you’re a cybersecurity professional, and one of your clients has been...
Imagine you’re a cybersecurity professional, and one of your clients has been...
The immudb storage layout consists of the following append-only logs per database:
Indexing is the first thing that comes to mind when we consider a database’s performance. B-tree is...
Unlike an ordinary Merkle tree, immudb tree can produce inclusion and consistency proofs that allow...
immudb is an open source Immutable Database that supports Cryptographical verification,...
I’ve been working on immudb as a core developer and wanted to answer some questions that the...
We have just released a new version of...
In today’s environment, where it’s necessary to maintain timely and transparent information access,...
Bartłomiej Święcki, one of our immudb Core developers wrote a blog about pool-throttler used in Go.
We’re pleased to introduce version 1.4 of immudb, which comes with two major...