Latest Articles
displayMode
paginated
category
Security
showImagesOnMobile
false

Security
2 Minute Read
A Path to Proactive Security Through Automation
The sheer number of cyberattacks launched against organizations every year is massive and growing. Learn how automation can help your security team chart a new path forward.

Security
5 Minute Read
Advanced Link Analysis: Part 1 - Solving the Challenge of Information Density
Leverage Sigbay's link analysis visualization to solve the challenge of information density.

Security
6 Minute Read
Box Automates Intelligence and Workflows While Reducing Manual Work Hours with TruSTAR
Box is the market leader for Cloud Content Management. Read on for more in this Q&A with Box's Kyle Bailey, Manager, Threat Operations.

Security
3 Minute Read
Top 3 Market Trends for SOAR Solutions
Lear more about the general market trends for SOAR, investment recommendations, and how Splunk Phantom aligns with Gartner’s vision for SOAR.

Security
5 Minute Read
Visual Link Analysis with Splunk: Part 3 - Tying Up Loose Ends
Using Splunk for Link Analysis part 3, addressing loose ends with visual link analysis.

Security
3 Minute Read
Staff Picks for Splunk Security Reading January 2021
These monthly postings will feature the favorite security-centric presentations, white papers and customer case studies from various peeps in the Splunk (or not) security world that WE think everyone should read. If you would like to read other months, please take a peek at previous posts in the "Staff Picks" series!

Security
1 Minute Read
Next Level Automation: What’s New with Splunk Phantom
With the release of Splunk Phantom 4.10.1, we now allow you to configure the number of playbook runners using Python 2 and Python 3. Learn more right here.

Security
4 Minute Read
Visual Link Analysis with Splunk: Part 2 - The Visual Part
Using Splunk for link analysis - part 2 covering visualizations of linked data.
Security
3 Minute Read
Cybersecurity Today: Alice in Wonderland Meets the Matrix & Total Recall
The scale of cyber attacks and the complexity of networks exacerbate the situation. Operators face three significant challenges: an IT security ecosystem that is fragmented and in flux, users that are both human and machine, and multiple threats with varying levels of severity and sophistication.