Skip to main content
false

Security Blogs

Security
3 Min Read
Announcing the availability of Cisco Talos Incident Response services to Splunk customers.

Latest Articles

Security 2 Min Read

Staff Picks for Splunk Security Reading: January 2018

A monthly series of staff picked content from the Splunk security world. Each month will have a new selection of Splunk security presentations, white papers, or blog posts that you might have missed.
Security 2 Min Read

Not All SIEM Solutions Are Created Equal

See how Splunk's analytics-driven SIEM solution tackles real-time security monitoring, advanced threat detection, forensics and incident management
Security 1 Min Read

Security Update: Meltdown and Spectre vulnerabilities

Splunk CISO, Joel Fulton, provides update regarding Meltdown/Spectre vulnerabilities
Security 4 Min Read

Configuring JA3 with Bro for Splunk

Configuring Bro to output JA3 signatures and how to ingest that data into Splunk
Security 8 Min Read

Ensuring Success with Splunk ITSI - Part 1: Thresholding Basics

Practical step-by-step guidance to configure ITSI to produce accurate and trusted alerts
Security 3 Min Read

Detecting Typosquatting, Phishing, and Corporate Espionage with Enterprise Security Content Update

Splunk’s Enterprise Security Content Update (ESCU) app can provide you with early warnings and situational awareness—powerful elements of an effective defense against adversaries
Security 4 Min Read

Tall Tales of Hunting with TLS/SSL Certificates

TLS and SSL certificates are a great way to hunt advanced adversaries. Collect them with Splunk Stream, Bro, or Suricata and hunt in your own data!
Security 2 Min Read

Splunk Named a Leader in Gartner SIEM Magic Quadrant for the Fifth Straight Year

Gartner's 2017 Magic Quadrant for Security Information and Event Management names Splunk a leader for the fifth straight year
Security 3 Min Read

Playbooks: Automated Investigation & Mitigation for Apple macOS Root Bypass Issue

Automation and Orchestration Playbook for Investigation & Mitigation of Apple macOS 10.13 High Sierra Root Bypass Issue CVE-2017-13872
Security 2 Min Read

Cybersecurity Framework: A Pragmatic Path to Bolstering Security

Splunker Ashok Sankar shines the spotlight on the security challenges faced within the public sector
Security 2 Min Read

Who You Gonna Call? Hostbusters! I Ain’t Afraid Of No Breach!

The similarities between cybersecurity and bustin' ghosts are, well...spooky!
Security 1 Min Read

What’s Cyber Security Week like for Splunk? it-sa gold!

Two gold awards and a successful it-sa event - that's how Splunk does Cyber Security Week!
Security 3 Min Read

Playbook: Investigating Phishing Attachments with McAfee

This phishing investigation playbook leverages McAfee Advanced Threat Defense (ATD), McAfee OpenDXL, and a suite of other products.
Security 4 Min Read

The New Norm in Cybersecurity

We're kicking off Cybersecurity Awareness Month with a look at "Simple Steps to Safer Digital Transformation"
Security 4 Min Read

Building a $60 Billion Data Model to Stop US Healthcare Fraud (Part 2)

In the second of a two-part series on healthcare fraud, Gleb Esman dives into predicting provider exclusion via supervised learning with the Splunk Machine Learning Toolkit
Security 4 Min Read

A Little Fraud Goes a Long Way: What You Need to Know About Fraud Detection

With a drastic increase in security threats such as fraud, understanding your most critical data and how you can protect it is key
Security 3 Min Read

What You Need to Know About Boss of the SOC

We introduced a new security activity at .conf2016 called “Boss of the SOC” (or BOTS), born from our belief that learning can be both realistic and fun.