Security

Security

Splunk at Black Hat USA 2017

The Splunk Security team is gearing up for Black Hat and DEF CON in Las Vegas this week – get a look at what's in store.

Security

Work(flow)ing Your OSINT

How to use Workflow actions and Open Source Intelligence sources. Make sure to scroll to bottom for easy to use chart and a free workflow_actions.conf

Security

The Five Essential Capabilities of an Analytics-Driven SOC: Adopt an Adaptive Security Architecture

An adaptive response model aims to help security analysts better handle threats by reducing the time it takes to make decisions and take action

Security

Finding Islands in the Stream (of Data)...

Using stream to find malicious activity in your network

Security

Don’t Let Your Legacy SIEM Be Tomorrow’s Breach Headline

Did you know that your legacy SIEM might be weakening your security posture?

Security

Data Sherlock: ArcSight Replacement

Get off your legacy SIEM and on to a trusted platform that will provide protection for your company moving forward