Latest Articles
displayMode
paginated
category
Security
showImagesOnMobile
false

Security
24 Minute Read
AppLocker Rules as Defense Evasion: Complete Analysis
The Splunk Threat Research Team analyzes 'Azorult loader' (a payload that imports its own AppLocker rules) to understand the tactics and techniques that may help defend against these types of threats.

Security
2 Minute Read
Staff Picks for Splunk Security Reading August 2022
Check out the latest staff picks from our Splunk security experts, featuring a list of presentations, whitepapers, and customer case studies that we feel are worth a read.

Security
2 Minute Read
Introducing the Ransomware Content Browser
Learn more about the Ransomware Content Browser recently released inside Splunk Security Essentials, aimed at helping customers combat the problem of ransomware.

Security
3 Minute Read
Splunk Announces Participation in the Open Cybersecurity Schema Framework (OCSF) Project
Announcing our participation as a co-founder of the new public Open Cybersecurity Schema Framework (OCSF) open-source project at Black Hat 2022.

Security
2 Minute Read
Security Made Stronger with Splunk User Behavior Analytics (UBA) Version 5.1
Announcing the availability of User Behavior Analytics (UBA) version 5.1

Security
2 Minute Read
Staff Picks for Splunk Security Reading July 2022
Welcome to the Splunk staff picks blog. Each month, Splunk security experts curate a list of presentations, whitepapers, and customer case studies that we feel are worth a read.

Security
6 Minute Read
ML Detection of Risky Command Exploit
Discover how to use machine learning algorithms to develop methods for detecting misuse or abuse of risky SPL commands to further pinpoint a true security threat.

Security
2 Minute Read
Splunk Security Essentials 3.6.0: A Holistic View of Your Security
Check out all the new features being released in Splunk Security Essentials 3.6.0.

Security
3 Minute Read
3 Important German BSI Documents Every SIEM & SOC Manager Needs To Know About
The German IT Security Act 2.0 (IT-SiG 2.0) has been in force for some time now. Due to this new law, significantly more German companies have been classified as operators of critial infrastructures (KRITIS) than ever. This is a major cause of headaches for many managers. In addition, IT departments are starting to ask themselves: "Are we now regarded as KRITIS"? And if so, "What do we have to take into consideration?" Splunker Matthias Maier shares the 3 most important BSI documents every SIEM and SOC manager needs to know about.