Latest Articles

Now Available: Splunk Enterprise Security Content Update App 5.0
Security
4 Minute Read

Now Available: Splunk Enterprise Security Content Update App 5.0

The Splunk Threat Research Team announces the release of the Enterprise Security Content Update (ESCU) app 5.0.
Cloud SOAR Achieves IRAP Assessment Along With Enterprise Security 8.0, DMX Edge Processor & Federated Search S3
Security
1 Minute Read

Cloud SOAR Achieves IRAP Assessment Along With Enterprise Security 8.0, DMX Edge Processor & Federated Search S3

We are delighted to announce that our Cloud SOAR solution has successfully completed the IRAP assessment.
Matching AI Strengths to Blue Team Needs
Security
6 Minute Read

Matching AI Strengths to Blue Team Needs

Discover how AI and Large Language Models (LLMs) enhance cybersecurity operations for Blue Teams.
Logs Are for Campfires: Splunk’s Asset and Risk Intelligence Leaves No Vulnerability Undiscovered!
Security
3 Minute Read

Logs Are for Campfires: Splunk’s Asset and Risk Intelligence Leaves No Vulnerability Undiscovered!

Splunk's Asset and Risk Intelligence enhances security by uncovering hidden vulnerabilities, prioritizing critical threats, and offering dynamic risk scoring for proactive risk mitigation and compliance.
Harness the Power of Cisco Talos Threat Intelligence Across Splunk Security Products
Security
4 Minute Read

Harness the Power of Cisco Talos Threat Intelligence Across Splunk Security Products

Leverage Cisco Talos’ threat intelligence through Cisco Talos Intelligence for Enterprise Security, the Cisco Talos Intelligence connector for Splunk SOAR, and as a globally enabled feature in Splunk Attack Analyzer.
The Modern SIEM Has Come a Long Way From Your Grandmother’s SIEM
Security
2 Minute Read

The Modern SIEM Has Come a Long Way From Your Grandmother’s SIEM

Explore how modern SIEM solutions tackle scalability, alert fatigue, and advanced threat detection with automation, machine learning, and real-time insights for efficient SOC workflows.
Meduza Stealer Analysis: A Closer Look at its Techniques and Attack Vector
Security
18 Minute Read

Meduza Stealer Analysis: A Closer Look at its Techniques and Attack Vector

Uncover Meduza Stealer, a 2023 malware targeting credentials and crypto wallets. Explore its evasion tactics, attack methods, and Splunk’s expert insights for enhanced security.
Cisco Intends to Acquire Threat Detection and Defense Company SnapAttack, Driving Further Splunk Innovation to Power the SOC of the Future
Security
2 Minute Read

Cisco Intends to Acquire Threat Detection and Defense Company SnapAttack, Driving Further Splunk Innovation to Power the SOC of the Future

Cisco announces it intent to acquire threat detection and defense company SnapAttack, driving further Splunk innovation to power the SOC of the future.
Logs Are For Campfires: Log Data, Big Data, and Splunk Asset & Risk Intelligence
Security
3 Minute Read

Logs Are For Campfires: Log Data, Big Data, and Splunk Asset & Risk Intelligence

Discover how Splunk Asset and Risk Intelligence (ARI) transforms log data into actionable insights. From automated asset discovery to risk and compliance management, ARI empowers organizations with real-time visibility, vulnerability tracking, and proactive threat mitigation. Elevate your security posture today.