Security

Security

Find the Ultimate Truth in the Wire. Even the most granular logs are not enough to be the truth

About the values of wired data embraced by Splunk SIEM technology, what it will bring to the future of SIEM.

Security

Steering Clear of the “WannaCry” or “Wanna Decryptor” Ransomware Attack

The detection and prevention of ransomware and other data-destructive malware continues to be one of the highest critical cybersecurity priorities in 2017

Security

New Capabilities Come to the Threat Intelligence Framework with Enterprise Security 4.7!

Check out new capabilities in Splunk Enterprise Security 4.7 for managing threat intelligence

Security

Strengthen Your Organization's Security Posture with the Splunk Blog

The Splunk blog is your go-to resource for learning how to use Splunk to improve your organization’s cybersecurity. Dive in with a few of our most popular posts on the topic.

Security

Punycode phishers - All you need to know

Unicode domains can be used for homograph attacks. Learn what they are and how users can be tricked.

Security

Splunk and Tensorflow for Security: Catching the Fraudster with Behavior Biometrics

Raising the barrier for fraudsters and attackers: how to leverage Splunk and Deep Learning frameworks to discover Behavior Biometrics patterns within user activities