false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Leadership 3 Min Read

Security 2023: Supply Chain Resilience, Talent and More

Splunk CISO Jason Lee takes a deeper dive into our 2023 Security Predictions report and explores why the linking of resilience and security is here to stay.
Security 2 Min Read

Visualising a Space of JA3 Signatures With Splunk

One common misconception about machine learning methodologies is that they can completely remove the need for humans to understand the data they are working with. In reality, it can often place a greater burden on an analyst or engineer to ensure that their data meets the requirements, cleanliness and standardization assumed by the methodologies used. However, when the complexity of the data becomes significant, how is a human supposed to keep up? One methodology is to use ML to find ways to keep a human in the loop!
Leadership 3 Min Read

2023 Predictions: Resilience in the Face of Uncertainty

Check out Splunk’s 2023 Predictions, featuring insights from Splunk senior leaders and technology experts on the present — and future — technological and economic landscape across security, IT, observability, emerging technologies and more.
Security 8 Min Read

Machine Learning in Security: Deep Learning Based DGA Detection with a Pre-trained Model

The Splunk Machine Learning for Security team introduces a new detection to detect Domain Generation Algorithms generated domains.
Industries 9 Min Read

Know Your Customer Again

The Know Your Customer use case is always going to be at the forefront of any Financial Services Industries institution. Nimish Doshi will provide more details in this blog for a prescriptive path on using Splunk products for KYC.
Security 10 Min Read

Detecting Cloud Account Takeover Attacks: Threat Research Release, October 2022

The Splunk Threat Research Team shares a closer look at the telemetry available in Azure, AWS and GCP and the options teams have to ingest this data into Splunk.
Security 13 Min Read

From Macros to No Macros: Continuous Malware Improvements by QakBot

This blog, the Splunk Threat Research Team (STRT) showcases a year's evolution of QakBot. We also dive into a recent change in tradecraft meant to evade security controls. Last, we reverse engineered the QakBot loader to showcase some of its functions.
Learn 11 Min Read

Security Books & Articles: Must-Read List From InfoSec Experts

Looking for your next read? Our security experts picked the very best security books, guides & articles. From hobbyists to pros, we’ve got books for you!
Leadership 3 Min Read

Peace on Earth and Peace of Mind With Business Resilience

The holidays are upon us and with that comes booming business and bad actors. Ensuring your business and systems are secure, available and resilient is critical.