Skip to main content
false

Security Blogs

Security
3 Min Read
Announcing the availability of Cisco Talos Incident Response services to Splunk customers.

Latest Articles

Security 4 Min Read

LogMeIn Accelerates Detection Use Case and Reduces Manual Analyst Workflow by Using TruSTAR

Discover how LogMeIn, one of the world's largest SaaS companies, uses TruSTAR and Splunk to help improve visibility, investigate faster, and scale.
Security 4 Min Read

CI/CD Detection Engineering: Failing, Part 3

In part 3 of our now 4-part series, we walk you through how we failed to use CircleCI to continually test detentions!
Security 3 Min Read

Something Else To Be Thankful For: Splunk Security Essentials 3.2.2

Are you ready for Splunk Security Essentials 3.2.2? We are and we're excited to highlight the best features so you can get hands-on now!
Security 3 Min Read

Staff Picks for Splunk Security Reading November 2020

These monthly postings will feature the favorite security-centric presentations, white papers and customer case studies from various peeps in the Splunk (or not) security world that WE think everyone should read. If you would like to read other months, please take a peek at previous posts in the "Staff Picks" series!
Security 3 Min Read

Gaining Control Over Medical and IoT Devices

It's important for health systems to protect all the devices within their operations to ensure patient data and, ultimately, care remains safe and reliable. Learn how with Medigate and Splunk.
Security 5 Min Read

7 High-Risk Events to Monitor Under GDPR: Lessons Learned from the ICO’s BA Penalty Notice

British Airways made the headlines when they were hacked, customer details stolen and were issued a Penalty Notice by the UK ICO. Matthias Maier took a closer look at the document and recapitulated the key takeaways any IT security person can learn from.
Security 4 Min Read

Better Detections and Cloud Coverage with Splunk Enterprise Security 6.4

New features in Splunk Enterprise Security help you improve your detections and secure your multicloud and hybrid environments.
Security 1 Min Read

Mitigating the Impact of Security Labor Scarcity with SOAR Solutions

SOAR solutions, such as Splunk Phantom, orchestrate actions across a variety of tools so your security team can focus less on repetitive, mundane tasks and more on mission critical threats.
Security 1 Min Read

Denmark’s Largest Utility Company Accelerates Incident Response

Norlys, Denmark’s largest power, utility and telecommunications company, saves us 35 hours per week — almost one full-time employee — with Splunk Phantom, a Security Orchestration, Automation and Response solution.
Security 2 Min Read

Detecting Data Exfiltration Via the Use of SNICat

TLS SNI extension can now be used to exfiltrate data. Learn how you can add the SNI detection for use in Splunk Enterprise Security.
Security 3 Min Read

Turning Data into Proactive Security

Discover how a proactive approach to security with the Splunk Data-to-Everything Platform can help effectively protect data assets from burgeoning cyberthreats to maintain 24/7 operation and uncompromising customer experiences.
Security 6 Min Read

Detecting Ryuk Using Splunk Attack Range

A new alert, Ransomware Activity Targeting the Healthcare and Public Health Sector, issued by the CISA poses ongoing and possible imminent attacks against the healthcare sector. Learn how you can detect the Ryuk ransomware as payload with Splunk Attack Range.
Security 4 Min Read

Ryuk and Splunk Detections

This blog discusses the current Ryuk ransomware campaign, methods for detection, and some upcoming releases from the Splunk Security Threat Research Team
Security 4 Min Read

Five Potential Threats to the 2020 U.S. Election

Splunk CISO Yassir Abousselham shares five potential threats to the 2020 U.S. Election, and what you need to know now to protect your organization — and your people.
Security 3 Min Read

What Do Splunk, Google Cloud, and Australian Cane Toads Have in Common?

Coming soon to a work monitor near you — brand new game scenarios for Boss of the SOC featuring Google Cloud Platform and Google Workspace launching at .conf20.
Security 3 Min Read

Splunk BOTS: Gamification in Cybersecurity - What Blue Teaming looks like with over 270 Teams across EMEA

We recently hosted a virtual Splunk Boss of the SOC EMEA Virtual Edition. Find out who was able to claim a podium a spot and what Splunk BOTS is all about in this blog post.
Security 5 Min Read

Detecting Google Cloud Platform OAuth Token Abuse Using Splunk

Google Cloud Platform's Identity Access Management (IAM) permissions can be used to move laterally and escalate privileges. Learn how to detect GCP OAuth token abuse and remediate these events with Splunk.
Security 1 Min Read

Sweet SIEMs are Made of These: Your Cybersecurity Playlist

We recently ran a virtual EMEA BOTS and to help you reminisce in the good times, Matt Davies put together a Boss of the SOC playlist. Tune in and enjoy!