Skip to main content
false

Security Blogs

Security
3 Min Read
Announcing the availability of Cisco Talos Incident Response services to Splunk customers.

Latest Articles

Security 6 Min Read

Approaching Kubernetes Security — Detecting Kubernetes Scan with Splunk

Approaching Kubernetes security. Detect and investigate Kubernetes cluster scan and fingerprinting using Splunk.
Security 6 Min Read

Online Sales Are Up! Ensure Your E-Commerce Platform is Not Being Used for Fraud

Many simple ways to monitor your e-commerce site to make sure it is not being used for fraud.
Security 3 Min Read

Splunk Attack Range Now With Caldera and Kali Linux

An overview of the updates the Splunk Security Research Team has been working on for Splunk Attack Range, now with Caldera adversarial simulation framework and Kali Linux
Security 3 Min Read

3 Tips for Building a Strong Unified Cloud Security Strategy

How to tackle cloud security in an increasingly complex and diverse environment.
Security 2 Min Read

How to Use Splunk Security Solutions to Improve Incident Response: Lessons Learned from the GE Digital Predix SOC Team

Security teams facing increased demand on reduced resources have learned to use the right technology to enable them to scale.
Security 2 Min Read

Your Employees Are Superheroes, but This Superpower Might Be a Security Risk

With most users remote, companies should still be looking for account compromise. Here's an easy monitoring solution with Splunk.
Security 5 Min Read

Integrating COVID (or Any) Threat Indicators with MISP and Splunk Enterprise Security

Integrating MISP servers with Enterprise Security's Threat Intelligence framework
Security 3 Min Read

The Easy Guide to Adding COVID-19 Context to Any Process

Add COVID-19 context to your investigations with a modular Splunk Phantom playbook
Security 3 Min Read

North American BOTS Day 2020

BOTS day is back for 2020, and this time (unsurprisingly), it's going virtual! The North America BOTS day event will be held on July 16, 2020.
Security 3 Min Read

Protecting Your Assets: It’s Not Just About Servers and Laptops!

Learn how physical security events can be utilized effectively across many use cases as more users work remotely
Security 5 Min Read

Analytics Stories for Splunk Enterprise Security, Part 2: Creating and Sharing (Because Sharing is Caring) Use Cases

Building and organizing your own content into use cases in Enterprise Security and sharing them with your friends and neighbors
Security 3 Min Read

Between Two Alerts: Phishing Emails — Don’t Get Reeled In!

Our SOAR platform, Phantom, allows you to orchestrate and automate responses to these types of threats in no time flat. Let us teach you how.
Security 6 Min Read

Staff Picks for Splunk Security Reading April 2020

Check out our favorite April 2020 security-centric presentations, white papers and customer case studies from the Splunk (or not) security world.
Security 2 Min Read

Between Two Alerts: Get Started with Splunk for Security

Read how the Splunk Security Essentials (SSE) app can help you answer common security questions with more than 120 pre-loaded correlation searches, and maps to more than 450 pieces of content from Splunk premium products.
Security 3 Min Read

Zoom in on Security in a Remote Work World

Using Splunk and Phantom to enrich Zoom lives to provide insight into meeting security.
Security 4 Min Read

Analytics Stories for Splunk Enterprise Security, Part 1: Organizing My Security Use Cases

Using the Use Case Library and Analytic Stories to organize security use cases
Security 2 Min Read

Between Two Alerts: Shifting Mindsets – Modernizing the SOC

Learn how to leverage the Splunk Security Operations Suite to address today’s security challenges and create an integrated security platform.
Security 2 Min Read

Fraud Detection: WFH Leading to Increased BEC and Phishing Threats — What To Look For

We take a look at a couple examples that can help detect BEC and phishing, and highlight how some people may already have the data in Splunk!