Skip to main content
false

Security Blogs

Latest Articles

Security 2 Min Read

Punycode phishers - All you need to know

Unicode domains can be used for homograph attacks. Learn what they are and how users can be tricked.
Security 2 Min Read

Use Advanced Threat Detection to Find the Next Shamoon Attack Before It Finds You

Splunker Girish Bhat explains how to use an analytics-driven SIEM solution to detect advanced persistent threats.
Security 1 Min Read

Splunk Enterprise meets Common Criteria

Splunk Enterprise Awarded NIAP Common Criteria Certification
Security 2 Min Read

Assigning Role Based Permissions in Splunk Enterprise Security

Learn how to add a new role in Enterprise Security and apply capabilities to it
Security 2 Min Read

Find Malicious Insiders Before You Become a Headline

Guard against malicious insider threats, monitor user behavior with analytics-driven, identity-oriented security information & event management (SIEM) solution.
Security 4 Min Read

Improving Visibility in Security Operations with Search-Driven Lookups

Initially from legacy SIEM users, Search-Driven Lookups generate watchlists to track events & detect malware from IP address, hostname & signature values.
Security 2 Min Read

How Splunk Can Help You Prevent Ransomware From Holding Your Business Hostage

Ransomware is a serious issue for companies and individuals. A Splunk download can keep your business from being held hostage, here’s how.