Security

Security

How to Define Your Security Posture, and Why it Matters

Establishing and managing an organization's cybersecurity posture is pivotal for delivering business success in the modern era.

Security

Gaining Control Over Medical and IoT Devices

It's important for health systems to protect all the devices within their operations to ensure patient data and, ultimately, care remains safe and reliable. Learn how with Medigate and Splunk.

Security

7 High-Risk Events to Monitor Under GDPR: Lessons Learned from the ICO’s BA Penalty Notice

British Airways made the headlines when they were hacked, customer details stolen and were issued a Penalty Notice by the UK ICO. Matthias Maier took a closer look at the document and recapitulated the key takeaways any IT security person can learn from.

Security

Better Detections and Cloud Coverage with Splunk Enterprise Security 6.4

New features in Splunk Enterprise Security help you improve your detections and secure your multicloud and hybrid environments.

Security

Strengthening Security with MITRE ATT&CK® Featuring a Guest Speaker from IDC

How can security analysts enhance their security operations and address the increasing and endless cyber threats? Learn how you can start aligning the MITRE ATT&CK Framework with Splunk SIEM.

Security

Mitigating the Impact of Security Labor Scarcity with SOAR Solutions

SOAR solutions, such as Splunk Phantom, orchestrate actions across a variety of tools so your security team can focus less on repetitive, mundane tasks and more on mission critical threats.

ALL TAGS

Security

Show All Tags
Show Less Tags