How to use Workflow actions and Open Source Intelligence sources. Make sure to scroll to bottom for easy to use chart and a free workflow_actions.conf
An adaptive response model aims to help security analysts better handle threats by reducing the time it takes to make decisions and take action
Using stream to find malicious activity in your network
Did you know that your legacy SIEM might be weakening your security posture?
Get off your legacy SIEM and on to a trusted platform that will provide protection for your company moving forward
How to use the Lookup command in Splunk to compare IOCs or other items of interest against your Splunk dataset