false
Jose Enrique Hernandez

Jose Enrique Hernandez

Currently, Jose Enrique Hernandez is the Director of Threat Research at Splunk (STRT). Previously Jose is co-founded Zenedge acquired by Oracle. Jose is known for creating several security-related projects, including: Splunk Attack Range, Splunk Security Content, Git-Wild-Hunt, Melting-Cobalt, and BlackCert projects. He also works as a maintainer to security industry critical repositories such as Atomic Red Team and lolbas-project.github.io.

Platform 11 Min Read

Clara-fication: Data Onboarding Best Practices

The Splunk Security Center of Excellence outlines best practices they follow to bring data into Splunk.
Platform 4 Min Read

From Setup to Migration: Azure Event Hubs in Data Manager

Seamlessly integrate Azure Event Hubs with Splunk Data Manager and enhance your data management with efficient, secure, and scalable solutions.
Splunk Life 3 Min Read

Embracing Flexibility to Do Great Work

Work in the ways that work for you. Learn how Splunkers define flexibility, and how they work with their teams to make the best work happen.
Platform 3 Min Read

Introducing Cloud Monitoring Consoles’s New Overview Dashboard: Intuitive Actionable Insights at Your Fingertips

Splunk's Cloud Monitoring Console (CMC) 3.35.0 introduces a new Overview dashboard, centralizing key metrics, highlighting issues, and offering tools to help admins optimize performance and gain faster insights.
Learn 9 Min Read

Security Compliance: A Complete Introduction

Security compliance helps businesses safeguard data, meet regulations, and prevent breaches. Learn key frameworks, roles, and best practices for compliance success.
Learn 5 Min Read

How Logging Works in Kubernetes: Challenges, Approaches, and Solutions for K8s Logging

Managing logs in Kubernetes isn’t easy, but with the right understanding and approaches, you can set up a consistent, unified Kubernetes logging and observability solution.
Learn 7 Min Read

Cloud Automation Explained

Cloud automation streamlines cloud management by automating deployment, scaling, and maintenance. Learn its benefits, challenges, and best practices.
Learn 8 Min Read

How Supply Chain Attacks Work: Definition, Types, Security and Prevention

Supply chain attacks exploit trusted third parties and vendors to gain access to compromise the supply chain. Read on to learn more.
Learn 6 Min Read

What Is a MITM Attack? Man in the Middle Attacks, Explained

In this post, we'll discuss Man in the Middle attack including what a MITM attack is, how it works, and ways to keep your data safe.