The Splunk Add-on for OT Security expands existing Splunk Enterprise Security frameworks to improve security visibility in OT environments for our customers, partners and community members.
We've compiled step-by-step instructions on how to get deeper insight and audit correlation searches running inside your enterprise security environment.
The best things come in threes and for the third year in a row, Splunkers down-under will take to the (virtual) thunderdome to battle it out for supreme bragging rights in the Australia & New Zealand Boss of the SOC (BOTS) Day held on August 20, 2020.
Introducing Splunk's latest thinking on an age-old problem — fighting financial crime. Two new assets explores the current financial crime landscape and key challenges, and also outlines a six-stage framework for using Splunk to operationalize data.
Watering hole attacks involve a web server that hosts files or applications where the website or files on the site become weaponized with malware. Learn how you can detect and prevent these attacks with Splunk UBA.
This blog will guide you through some of the new features of Security Essentials 3.1 that will help you find the content that matters the most to you, faster.
Contextualizing correlation searches and notable events in Splunk Enterprise Security with MITRE ATT&CK techniques provides SOC analysts with greater insights into the events they are analyzing