Skip to main content
false

Security Blogs

Security
3 Min Read
Announcing the availability of Cisco Talos Incident Response services to Splunk customers.

Latest Articles

Security 2 Min Read

Security is Everything at RSAC 2020

Will you be one of the 50,000 security practitioners attending RSA Conference 2020 in San Francisco? We'll have dozens of demos and presentations showcasing use cases.
Security 2 Min Read

Staff Picks for Splunk Security Reading February 2020

These monthly postings will feature the favorite security-centric presentations, white papers and customer case studies from various peeps in the Splunk (or not) security world that WE think everyone should read. If you would like to read other months, please take a peek at previous posts in the "Staff Picks" series!
Security 3 Min Read

Speed: A Security Analyst’s Best Friend

Speed is the barometer for the strength of an organization’s security and Splunk Phantom is the SOAR platform that can help drastically increase the speed of security operations..
Security 2 Min Read

SOAR In Your Pocket

Let's take a look behind the scenes and find out how SOAR solutions can have a positive impact on your security investigation and response efficiency.
Security 2 Min Read

World Economic Forum In Davos - Growth in Global Technology Risk

Taking a look at the World Economic Forum (WEF) in Davos 2020 from a cybersecurity angle. What technology risks should we be prepared for according to the WEF?
Security 4 Min Read

Detecting CVE-2020-0601 Exploitation Attempts With Wire & Log Data

Learn two simple techniques for detecting CVE-2020-0601 exploitation attempts using Splunk
Security 4 Min Read

CVE-2020-0601 - How to operationalize the handling of vulnerabilities in your SOC

Recently the CVE-2020-0601 vulnerability was discovered by the NSA. Find out everything you need to know and how you can tackle it in this blog post.
Security 2 Min Read

Using Splunk Attack Range to Test and Detect Data Destruction (ATT&CK 1485)

Using Splunk Attack Range to test and detect Data Destruction techniques
Security 2 Min Read

Q&A Follow-Up: How Datev uses MITRE ATT&CK & Splunk in its SOC

Following our webinar with Datev on how they use MITRE ATT&CK & Splunk in its SOC, we compiled all of the questions left unanswered in this blog post. Read all of it here,
Security 2 Min Read

Too Many Security Alerts, Not Enough Time: Automation to the Rescue

Across the globe, cyberattacks are on the rise which means security teams are going to be even more overwhelmed with "alert fatigue". Automating security alert triage can save analysts thousands of hours and millions of dollars per year.
Security 5 Min Read

Staff Picks for Splunk Security Reading November 2019

These monthly postings will feature the favorite security-centric presentations, white papers and customer case studies from various peeps in the Splunk (or not) security world that WE think everyone should read. If you would like to read other months, please take a peek at previous posts in the "Staff Picks" series!
Security 2 Min Read

Confessions of Security Analysts

250 IT and Security professionals weigh in on how a SOAR tool meets the many challenges of working in cybersecurity.
Security 2 Min Read

Splunk's Attack Range Provides a Simple Framework for Generating Attack Data

Splunk's Attack Range provides a turnkey framework for creating environments to simulate attacks as close to "ground truth" as possible.
Security 1 Min Read

Use CI to Automatically Catch Dead Links in Your GitHub Project

Automate out your margin of error by using Circle CI to catch dead links in Git.
Security 1 Min Read

The Path Forward: Mitigating Cyber Threats in Banking with Next-Generation Platforms

The financial services industry needs to keep pace with proliferation of data across the enterprise in order to keep pace with rapidly evolving cyber attack types.
Security 5 Min Read

Stitching Notables Together with Event Sequencing

Event Sequencing can take multiple notable events that are created from correlation searches and present them to the analysts as a set of linked notable events and help prioritize response when these chain of events occur.
Security 2 Min Read

Balancing Digital Advances with Security Exposure Takes 2020 Vision

Splunk has joined forces with other IT and OT security firms to charter and evolve the Operational Technology Cyber Security Alliance (OTCSA).
Security 4 Min Read

Staff Picks for Splunk Security Reading October 2019

A selection of presentations, white papers and blog posts you might have missed in this month (or before), handpicked from the Splunk security world