false
Drew Gibson

Drew Gibson

Learn 4 Min Read

Ransomware Families & RaaS Groups

Every 19 seconds a ransomware attack launches. Are these standalone attacks? Are they operating within a ransomware family of shared knowledge? Find out here.
Learn 7 Min Read

Threat Hunting vs. Threat Detecting: What's The Difference?

Hunting threats, detecting threats. Sounds the same — but they are not! Get tons of info (+ free resources) for prevention methods that underpin cybersecurity.
Leadership 6 Min Read

Leadership differentiation opportunities in 2023

Irrespective of the prediction, trend or new amazing technology, its impact is only realised when successfully deployed by an organisation’s expert team(s). To help, I’ve captured just a few of my thoughts for how leaders can differentiate some broad demands to make the best impact in the year to come.
Learn 3 Min Read

The Triple DES Intro: Triple Data Encryption Standard

Triple DES is an encryption standard that’s NIST-approved for use through 2030. Let’s see how it works and when you want — and don’t want — to use it.
Leadership 3 Min Read

New Research on Digital Resilience Unveils Massive Opportunity for Organizations

Splunk's 'Digital Resilience Pays Off' report explores how organizations are investing in critical digital resilience capabilities and the business impact.
Learn 4 Min Read

Elliptic Curve Cryptography: An Introduction

Let’s see how elliptic curve cryptography works, in this digestible, less academic look that still thoroughly explains this technical topic.
Learn 3 Min Read

Splunk OnDemand Services: An Introduction & Example

Get started with Splunk OnDemand Services (ODS), an advisory service that bridges the gap between Technical Support and project-based services delivered by Professional Services.
Security 3 Min Read

Staff Picks for Splunk Security Reading February 2023

Explore the latest list of presentations, whitepapers, and customer case studies that our Splunk security experts feel are worth a read.
Learn 3 Min Read

Honeypots Explained: Hitting Hackers Where It Hurts

Entice hackers to your system to gather cyberthreat intelligence. Get the latest on honeypot types and interactions and see why it isn’t all so sweet.