Coming soon to a work monitor near you — brand new game scenarios for Boss of the SOC featuring Google Cloud Platform and Google Workspace launching at .conf20.
Google Cloud Platform's Identity Access Management (IAM) permissions can be used to move laterally and escalate privileges. Learn how to detect GCP OAuth token abuse and remediate these events with Splunk.
Microsoft's recent security disclosure of CVE-2020-1472 is extremely harmful to systems that have not been patched or lack mitigations in place. Learn how to prevent and detect CVE-2020-1472 using Splunk Attack Range.
It's our favorite time of the year again – .conf season! The Splunk Security team has lined up an awesome collection of sessions that you do not want to miss.
Modular Workbooks allow you to effortlessly adapt your security operations workflow. Learn how Splunk Phantom SOAR can help divide tasks into phases, assign responsibilities to team members, and document your work.
Learn how you can start identifying business-critical data, configuring your systems, and demonstrate how to onboard and normalize Windows, Linux and Cisco ASA data into Splunk Cloud so that you can start getting valuable insights today.