Skip to main content
false
David Dalling
David Dalling

David is a subject matter expert with over 20 years of Information Security experience and IT Operations. He is an accomplished, motivated, and versatile IT professional in a variety of Information Technology fields ranging from hands-on systems development, testing, and management to enterprise-level strategic planning, and consultation. David is a man of firsts; He helped get the DHS Enterprise Security Operations program its first ever ATO, wrote the first ever common control package for DHS, received a security engineering award at DHS HQ for developing a metrics program that contributed to DHS first ever perfect score card. Taking this experience David then lead the development of the first ever Managed XDR service to receive its FedRAMP Authorization. David has now taken his love to take on new challenges to Adventure racing were he purposely gets lost in the woods to compete with Trail running, Mountain biking and kayaking for 100s miles. As the Global VP for Splunk’s Cyber Strategist team, David helps drive the security strategy for Splunk and its security products.

Learn 6 Min Read

Endpoint Security Explained

Discover the role of endpoint security in protecting network integrity. This guide shares insights into implementing robust security measures for effective cyber defense.
Learn 5 Min Read

AI Bill of Rights: What Does It Mean?

In this blog post, we will delve into what the AI Bill of Rights is, its key principles, and the future of AI regulation in the United States.
Learn 4 Min Read

What is a Computer Server?

Computer servers do indeed serve: they serve up compute power and data! Get the full server story in this in-depth article.
Learn 7 Min Read

Continuous Threat Exposure Management (CTEM)

Attack surfaces changing daily? Cyber threats on the rise? Old ways of working ain't cutting it? CTEM may be your cyber solution. Get the full story here.
Learn 6 Min Read

The SaaS Security Guide: Best Practices for Securing SaaS

In this article, let’s look at SaaS security: what it is, the most common threats to SaaS and actionable best practices for securing SaaS applications.
Security 17 Min Read

Hunting M365 Invaders: Blue Team's Guide to Initial Access Vectors

Discover insights from the Splunk Threat Research Team on Microsoft 365 threat detection, focusing on data source analysis and effective methods for hunting initial access threats.
DevOps 5 Min Read

The Importance of Traces for Modern APM [Part 2]

In the second part of this blog we will explore how increased entropy forces us to rethink what is required for monitoring.
Learn 6 Min Read

Google Dorking: An Introduction for Cybersecurity Professionals

In this blog post, we'll take a look at the basics of Google Dorking (AKA Google Hacking), how it can impact your organization, and steps you can take to mitigate this risk.
Learn 2 Min Read

RED Monitoring: Rate, Errors, and Duration

In this blog post, we'll take a brief look at the RED monitoring framework, its benefits, and how it is used in the modern digital enterprise.