Fleak Blog

Fleak Blog

Welcome to the Fleak Blog, your resource for mastering dynamic API building. Whether you're a data scientist, engineer, or tech leader, find curated insights, expert tutorials, and innovative techniques to simplify your workflow. Explore the latest tech trends and empower your team with the knowledge to drive your projects forward efficiently.

Jul 25, 2025

Jul 25, 2025

The Data Format Problem Killing Your Security AI Performance

Demo: 95% accuracy. Production: 27% accuracy. The culprit? Your AI models are fluent in vendor demos but can't speak the dozens of data dialects flooding your actual security environment.

Demo: 95% accuracy. Production: 27% accuracy. The culprit? Your AI models are fluent in vendor demos but can't speak the dozens of data dialects flooding your actual security environment.

By

Yichen Jin

Co-Founder & CEO, Fleak

Jul 23, 2025

Jul 23, 2025

AI-Ready Security Data is a Data Engineering Problem

Security teams invest in AI but see no ROI because they're building on a broken data foundation. This isn't a security failure; it's a data engineering problem solved by prioritizing high-quality, normalized data over raw volume.

Security teams invest in AI but see no ROI because they're building on a broken data foundation. This isn't a security failure; it's a data engineering problem solved by prioritizing high-quality, normalized data over raw volume.

By

Bo Lei

Co-Founder & CTO, Fleak

Jul 11, 2025

Jul 11, 2025

A Step-by-Step Guide: From Okta Logs to OCSF in Databricks

Transform Okta logs to OCSF for analysis in Databricks. This guide covers automated mapping with Fleak, building a data pipeline with ZephFlow, and querying your logs in a Delta Lake. Simplify your security analytics workflow now.

Transform Okta logs to OCSF for analysis in Databricks. This guide covers automated mapping with Fleak, building a data pipeline with ZephFlow, and querying your logs in a Delta Lake. Simplify your security analytics workflow now.

By

Gerrit Jansen van Vuuren

Fouding Engineer, Fleak

Jul 2, 2025

Jul 2, 2025

The OWASP LLM Top 10 for 2025: A Practical Security Guide for Engineering Teams

The OWASP 2025 LLM Top 10 is here, targeting real-world attacks. Our guide for engineers breaks down new threats like Vector Security and Prompt Leakage, offering practical tips to secure your LLM apps from sophisticated exploits.

The OWASP 2025 LLM Top 10 is here, targeting real-world attacks. Our guide for engineers breaks down new threats like Vector Security and Prompt Leakage, offering practical tips to secure your LLM apps from sophisticated exploits.

By

Bo Lei

Co-Founder & CTO, Fleak

Jun 15, 2025

Jun 15, 2025

OCSF to S3: Streaming with Kinesis, Firehose, and Zephflow

In Part 2, we build the final stage of our pipeline. Learn to stream OCSF logs to S3 as Parquet using Kinesis Firehose, a Glue schema, and a Zephflow sink, making your data ready for large-scale analysis.

In Part 2, we build the final stage of our pipeline. Learn to stream OCSF logs to S3 as Parquet using Kinesis Firehose, a Glue schema, and a Zephflow sink, making your data ready for large-scale analysis.

By

Gerrit Jansen van Vuuren

Fouding Engineer, Fleak

Jun 13, 2025

Jun 13, 2025

From VPC Logs to OCSF: A Streaming Pipeline with Kinesis and Zephflow

In part one of our series with Cardinal, learn to transform AWS VPC logs into the query-ready OCSF format. We'll build a streaming data pipeline using Fleak's OCSF Mapper, Zephflow, and Kinesis.

In part one of our series with Cardinal, learn to transform AWS VPC logs into the query-ready OCSF format. We'll build a streaming data pipeline using Fleak's OCSF Mapper, Zephflow, and Kinesis.

By

Gerrit Jansen van Vuuren

Fouding Engineer, Fleak

Start Building with Fleak Today

Production Ready Transformation in Minutes

Request a Demo

Start Building with Fleak Today

Production Ready Transformation in Minutes

Request a Demo