These monthly postings will feature the favorite security-centric presentations, white papers and customer case studies from various peeps in the Splunk (or not) security world that WE think everyone should read. If you would like to read other months, please take a peek at previous posts in the "Staff Picks" series!
It's important for health systems to protect all the devices within their operations to ensure patient data and, ultimately, care remains safe and reliable. Learn how with Medigate and Splunk.
British Airways made the headlines when they were hacked, customer details stolen and were issued a Penalty Notice by the UK ICO. Matthias Maier took a closer look at the document and recapitulated the key takeaways any IT security person can learn from.
SOAR solutions, such as Splunk Phantom, orchestrate actions across a variety of tools so your security team can focus less on repetitive, mundane tasks and more on mission critical threats.
Norlys, Denmark’s largest power, utility and telecommunications company, saves us 35 hours per week — almost one full-time employee — with Splunk Phantom, a Security Orchestration, Automation and Response solution.
Discover how a proactive approach to security with the Splunk Data-to-Everything Platform can help effectively protect data assets from burgeoning cyberthreats to maintain 24/7 operation and uncompromising customer experiences.
A new alert, Ransomware Activity Targeting the Healthcare and Public Health Sector, issued by the CISA poses ongoing and possible imminent attacks against the healthcare sector. Learn how you can detect the Ryuk ransomware as payload with Splunk Attack Range.
This blog discusses the current Ryuk ransomware campaign, methods for detection, and some upcoming releases from the Splunk Security Threat Research Team
Splunk CISO Yassir Abousselham shares five potential threats to the 2020 U.S. Election, and what you need to know now to protect your organization — and your people.
Coming soon to a work monitor near you — brand new game scenarios for Boss of the SOC featuring Google Cloud Platform and Google Workspace launching at .conf20.
We recently hosted a virtual Splunk Boss of the SOC EMEA Virtual Edition. Find out who was able to claim a podium a spot and what Splunk BOTS is all about in this blog post.
Google Cloud Platform's Identity Access Management (IAM) permissions can be used to move laterally and escalate privileges. Learn how to detect GCP OAuth token abuse and remediate these events with Splunk.
We recently ran a virtual EMEA BOTS and to help you reminisce in the good times, Matt Davies put together a Boss of the SOC playlist. Tune in and enjoy!