Skip to main content
false

Security Blogs

Latest Articles

Security 2 Min Read

Splunk Named a Leader in Gartner SIEM Magic Quadrant for the Fifth Straight Year

Gartner's 2017 Magic Quadrant for Security Information and Event Management names Splunk a leader for the fifth straight year
Security 3 Min Read

Playbooks: Automated Investigation & Mitigation for Apple macOS Root Bypass Issue

Automation and Orchestration Playbook for Investigation & Mitigation of Apple macOS 10.13 High Sierra Root Bypass Issue CVE-2017-13872
Security 2 Min Read

Cybersecurity Framework: A Pragmatic Path to Bolstering Security

Splunker Ashok Sankar shines the spotlight on the security challenges faced within the public sector
Security 2 Min Read

Who You Gonna Call? Hostbusters! I Ain’t Afraid Of No Breach!

The similarities between cybersecurity and bustin' ghosts are, well...spooky!
Security 1 Min Read

What’s Cyber Security Week like for Splunk? it-sa gold!

Two gold awards and a successful it-sa event - that's how Splunk does Cyber Security Week!
Security 3 Min Read

Playbook: Investigating Phishing Attachments with McAfee

This phishing investigation playbook leverages McAfee Advanced Threat Defense (ATD), McAfee OpenDXL, and a suite of other products.
Security 4 Min Read

The New Norm in Cybersecurity

We're kicking off Cybersecurity Awareness Month with a look at "Simple Steps to Safer Digital Transformation"
Security 4 Min Read

Building a $60 Billion Data Model to Stop US Healthcare Fraud (Part 2)

In the second of a two-part series on healthcare fraud, Gleb Esman dives into predicting provider exclusion via supervised learning with the Splunk Machine Learning Toolkit