Discover insights from the Splunk Threat Research Team on Microsoft 365 threat detection, focusing on data source analysis and effective methods for hunting initial access threats.
In this blog post, we'll take a look at the basics of Google Dorking (AKA Google Hacking), how it can impact your organization, and steps you can take to mitigate this risk.
We're excited to announce the release of the Splunk App for Behavioral Profiling 2.0 with a variety of capabilities providing enhancements across the application workflow in response to customer feedback.
Become a a well-rounded cybersecurity professional with these must-have skills! You'll tackle the ever-evolving threat landscape and protect sensitive information.
Explore the differences between OT security and IT security, delving into industry-specific challenges and solutions, with insights into the Purdue Model and how Splunk can help.
Suid Adeyanju, CEO of London-based cyber security consultancy RiverSafe, joins the Perspectives pod to discuss data access, strategically tackling tool sprawl and more.