false
Jose Enrique Hernandez

Jose Enrique Hernandez

Currently, Jose Enrique Hernandez is the Director of Threat Research at Splunk (STRT). Previously Jose is co-founded Zenedge acquired by Oracle. Jose is known for creating several security-related projects, including: Splunk Attack Range, Splunk Security Content, Git-Wild-Hunt, Melting-Cobalt, and BlackCert projects. He also works as a maintainer to security industry critical repositories such as Atomic Red Team and lolbas-project.github.io.

Security 4 Min Read

CISA’s Known Exploited Vulnerabilities Catalog and Splunk

Accompanying today’s announcement from CISA (BOD 22-01) and their new Known Exploited Vulnerabilities Catalog, SURGe and Splunk Threat Research Team (STRT) have coordinated to add functionality into Enterprise Security Content Updates (ESCU). This added functionality will help network defenders understand vulnerability context alongside relevant ESCU detections.
Observability 3 Min Read

New: Optimize Slow Queries with Enhanced Database Visibility in Splunk Observability

Splunk APM’s enhanced database visibility now helps you find slow and high execution queries causing service performance issues in SQL databases, no instrumentation required. On-call Service owners and SREs can quickly identify if a database is causing performance issues, isolate the query responsible, and pinpoint root cause within distributed systems, to troubleshoot faster.

Tesco - Delivering When It Mattered Most

Customers are our best storytellers at Splunk, and our latest EMEA customer case study is no exception. The team at retail giant Tesco are true Data Heroes, harnessing the power of the data to rapidly scale it’s digital business to put food on the table of millions of customers.
Platform 4 Min Read

Dashboard Studio: New Features Highlighted At .conf21

Scheduled Export for Dashboard Studio? Sankey Diagram? Click on a viz to set tokens? Learn more about these features and more in the Splunk Cloud Platform 8.2.2109 release.
Security 4 Min Read

Staff Picks for Splunk Security Reading October 2021

Hi everyone! Welcome to the Splunk staff picks blog. Each month, Splunk security experts curate a list of presentations, white papers, and customer case studies that we feel are worth a read. This month we decided to switch things up and include some of our favorite .conf21 presentations. We hope you enjoy.
Observability 5 Min Read

Why to Use OpenTelemetry Processors to Change Collected Backend Data

Security and efficiency is key when it comes to collected backend data. Why OpenTelemetry processors to change collected backend data can help.
Industries 6 Min Read

Reducing the Carbon Footprint of the Manufacturing Industry with the Power of Data

The Power of Data has much to offer such as environmentally friendly manufacturing, efficient logistics, improved building and energy management and optimized renewable energy production.
Observability 10 Min Read

Writing Ansible Playbooks for New Terraform Servers

See how you can write Ansible Playbooks for Terraform servers. With this technical tutorial of Ansible and Terraform together, DevOps and IT operations teams can execute playbooks faster and maintain a resilient CI/CD pipeline.
Partners 4 Min Read

.conf21: Driving Customer Success, Together with Partners - A Recap of Our Partner Feature Session

During our Partner Feature session at .conf21, a few strategic Cloud and Technology partners shared stories and examples about opportunities that our extended partner ecosystem can harness. These strategic partnerships are helping support customers on their cloud journeys, extending capabilities to new customers and new sets of data.