Tom Smit's Blog Posts
Tom Smit is a Principal Security Strategist at Splunk and has been a Splunker for eight years. He is active at Splunk as a voice for security, is a strong advocate of security workshops, sharing his experience, and bringing Splunk and security together for customers. During his time at Splunk he has been involved with content creation of Boss of the SOC v3, v4, v5, and head the v6 and v7 programs. Before joining Splunk, Tom held sales engineering, professional services, and product roles at Symantec, Mimecast, Raytheon, and Core Security.
Display Mode
Paginated
Filter
Author
Author URL
Limit
6

Peeping Through Windows (Logs): Using Sysmon & Event Codes for Threat Hunting
Windows and endpoints go together like threat hunting and Splunk. Let's look at the most valuable Sysmon event codes for threat hunting in Splunk.

Boss of the SOC Version 8 - Live from .conf23
Get a closer look at what to expect during Boss of the SOC at .conf23, where you'll leverage Splunk's Security Suite to answer a variety of questions about real-world incidents that security analysts face regularly.

Splunk Reddit Crosses 15,000 Strong
Splunk's subreddit on reddit.com has crossed the 15,000 user line! This blog is celebrating that fact with handy links, ideas, and topics.

Americas' BOTS Day '22
With less than a month to go before Americas' BOTS Day '22, we thought it would be the perfect time to explain what’s happening and how the day will go.

Security Made Stronger with Splunk User Behavior Analytics (UBA) Version 5.1
Announcing the availability of User Behavior Analytics (UBA) version 5.1

Boss of the SOC at Splunk .conf22!
Get a closer look at what to expect during Boss of the SOC at .conf22, where you'll leverage Splunk's Security Suite to answer a variety of questions about real-world incidents that security analysts face regularly.