Skip to main content
false

Tag: Splunk Enterprise Security

Latest Articles

Security 6 Min Read

Online Sales Are Up! Ensure Your E-Commerce Platform is Not Being Used for Fraud

Many simple ways to monitor your e-commerce site to make sure it is not being used for fraud.
Security 5 Min Read

Integrating COVID (or Any) Threat Indicators with MISP and Splunk Enterprise Security

Integrating MISP servers with Enterprise Security's Threat Intelligence framework
Security 3 Min Read

Protecting Your Assets: It’s Not Just About Servers and Laptops!

Learn how physical security events can be utilized effectively across many use cases as more users work remotely
Security 5 Min Read

Analytics Stories for Splunk Enterprise Security, Part 2: Creating and Sharing (Because Sharing is Caring) Use Cases

Building and organizing your own content into use cases in Enterprise Security and sharing them with your friends and neighbors
Security 4 Min Read

Analytics Stories for Splunk Enterprise Security, Part 1: Organizing My Security Use Cases

Using the Use Case Library and Analytic Stories to organize security use cases
IT 2 Min Read

Launching Websites Rapidly, Without Compromise

How can financial firms launch websites quickly, while ensuring that they are secure, protected against fraud, and still meet customer expectations? The answer is Splunk.
Security 2 Min Read

Between Two Alerts: Shifting Mindsets – Modernizing the SOC

Learn how to leverage the Splunk Security Operations Suite to address today’s security challenges and create an integrated security platform.
Security 2 Min Read

Fraud Detection: WFH Leading to Increased BEC and Phishing Threats — What To Look For

We take a look at a couple examples that can help detect BEC and phishing, and highlight how some people may already have the data in Splunk!
Security 5 Min Read

How Do I Add COVID (or Any) Threat Intelligence From the Internet to Splunk Enterprise Security?

This is another installment of the "Dear Buttercup..." series. Many organizations struggle with buying or affording threat intelligence to plug into Enterprise Security.