false
Jose Enrique Hernandez

Jose Enrique Hernandez

Currently, Jose Enrique Hernandez is the Director of Threat Research at Splunk (STRT). Previously Jose is co-founded Zenedge acquired by Oracle. Jose is known for creating several security-related projects, including: Splunk Attack Range, Splunk Security Content, Git-Wild-Hunt, Melting-Cobalt, and BlackCert projects. He also works as a maintainer to security industry critical repositories such as Atomic Red Team and lolbas-project.github.io.

Learn 6 Min Read

What's BPA? Business Process Analytics, Explained

Discover how leveraging data-driven insights can streamline complex IT systems, optimize processes, and propel your organization toward operational excellence.
Learn 7 Min Read

SNMP & SNMP Monitoring, Explained

Simple Network Management Protocol (SNMP) allows administrators to maintain nearly all aspects of a network — here are the tools and commands admins can put to use.
Leadership 2 Min Read

A Vision for the Future of Cyber

It’s becoming crystal clear that there is a disparity between the demand for skilled cybersecurity professionals and the available talent pool.
.conf & .conf Go 5 Min Read

.conf23: A Security Manager's Guide to the Must-Attend EMEA Sessions

What are the must-attend EMEA security sessions at .conf23? Splunker Matthias Maier highlights the top sessions and why they are not to be missed.
Splunk Life 2 Min Read

Reflecting on 2023 Global Health & Wellbeing Month

Learnings from the events Splunk hosted throughout the month
Security 9 Min Read

Don’t Get a PaperCut: Analyzing CVE-2023-27350

The Splunk Threat Research team shares insights on the CVE-2023-27350 vulnerability, proof of concept scripts, setting up Splunk logging, and detecting adversaries for secure printing.
Industries 1 Min Read

Splunk Achieves Secure Cloud Solution for SLED with StateRAMP Authorization

Splunk continues its commitment to state and local government and higher education by achieving an 'Authorized' designation from the State Risk and Authorization Management Program (StateRAMP®).
Security 3 Min Read

Splunk SOAR Playbook of the Month: Tackling Phishing Attempts with Identifier Reputation Analysis

Learn how you can use Splunk's identifier reputation analysis playbooks to implement a workflow that will help your team automate the alert and quarantine processes for potential threats based on key identifiers.
Security 11 Min Read

Do Not Cross The 'RedLine' Stealer: Detections and Analysis

The Splunk Threat Research Team provides a deep dive analysis of the RedLine Stealer threat and shares valuable insights to help enable blue teamers to defend against and detect this malware variant.