false
Rod Soto

Rod Soto

Worked at Prolexic, Akamai, Caspida. Won BlackHat CTF in 2012. Co-founded Hackmiami, Pacific Hackers meetup and conferences.

Using RAG, Splunk ES Content Update App (ESCU), and MLTK to Develop, Enhance, and Analyze Splunk Detections

Learn how to enhance Splunk security detections using a local Llama3 LLM, RAG, MLTK, and ESCU.

Using Splunk to Develop Local LLM MCP Mitre Atlas Detections

This comprehensive guide covers setting up a dockerized lab, log management, and detection strategies to secure AI-enabled systems against real-world threats.

Using Splunk to Monitor the Security of MCP Servers

Learn how to use Splunk to monitor MCP Server security.

How to Use Splunk to Monitor Security of Local LLMs (Part II)

Learn how to use Splunk to monitor and defend your local Large Language Models (LLMs).

How To Use Splunk To Monitor Security of Local LLMs (Part I)

Learn how to use Splunk to monitor the security of local Large Language Models (LLMs) like Llama and GPT4ALL.
Security 7 Min Read

Approaching Linux Post-Exploitation with Splunk Attack Range

An introduction to linux post exploitation simulation and threat detection using Splunk Attack Range and linux Sysmon.