Skip to main content
false

Security Blogs

Security
3 Min Read
Announcing the availability of Cisco Talos Incident Response services to Splunk customers.

Latest Articles

Security 2 Min Read

Assigning Role Based Permissions in Splunk Enterprise Security

Learn how to add a new role in Enterprise Security and apply capabilities to it
Security 2 Min Read

Find Malicious Insiders Before You Become a Headline

Guard against malicious insider threats, monitor user behavior with analytics-driven, identity-oriented security information & event management (SIEM) solution.
Security 4 Min Read

Improving Visibility in Security Operations with Search-Driven Lookups

Initially from legacy SIEM users, Search-Driven Lookups generate watchlists to track events & detect malware from IP address, hostname & signature values.
Security 2 Min Read

How Splunk Can Help You Prevent Ransomware From Holding Your Business Hostage

Ransomware is a serious issue for companies and individuals. A Splunk download can keep your business from being held hostage, here’s how.
Security 2 Min Read

Recap: Splunk @ Blackhat Europe 2016

Splunk at Blackhat Europe, a recap of schedule. Sharing latest tech on data analytics security, machine learning and threat intelligence gathering.
Security 2 Min Read

Playbook Series: Phishing: Automate and Orchestrate Your Investigation and Response

Respond with machine speed when a malicious phishing attack threatens your organization. Automation makes it possible.
Security 3 Min Read

Creating McAfee ePO Alert and ARF Actions with Add-On Builder

Creative Splunk community writes clever add-ons; Splunk Add-on Builder 2.0 wizard makes it easier than ever to build, test, pack add-ons for SplunkBase sharing.
Security 1 Min Read

Playbook: Investigate IP Address Performing Reconnaissance Activity

Phantom can receive reconnaissance alerts and automate key investigation steps to increase efficiency and speed decision making.
Security 2 Min Read

CVE-2015-7547: glibc: Detection with Splunk

Has your system been affected by the glibc vulnerability? This blog will give you the knowledge to figure out if you've been hit.