Latest Articles
displayMode
paginated
category
Security
showImagesOnMobile
false

Security
4 Minute Read
ATT&CK-ing the Adversary: Episode 3 – Operationalizing ATT&CK with Splunk
In the final episode in the MITRE ATT&CK trilogy, we focus on applying what we learned and operationalizing it with ATT&CK to assist our security operations

Security
5 Minute Read
ATT&CK-ing the Adversary: Episode 2 - Hunting with ATT&CK in Splunk
Using MITRE ATT&CK to focus your threat hunting in Splunk

Security
4 Minute Read
| datamodel Endpoint
Discover what's new in Splunk Common Information Model (CIM) 4.12

Security
1 Minute Read
Shifting Mindsets: Modernizing the Security Operations Center
How to go from an 'old school' to a 'new school' defender

Security
2 Minute Read
“Are We Secure?” Lessons Learned From The CISO Of A Leading Saudi Bank
A Splunk customer's presentation at Gartner’s 2018 Security Risk and Management Summit

Security
1 Minute Read
Three Questions For Empowering Security: From Gartner’s Risk and Security Management Summit Europe
Key takeaways from this year's Gartner Risk and Security Management Summit Europe

Security
3 Minute Read
I Azure You, This Will Be Useful
This blog post describes how to use Azure Active directory for basic hunting and discovery

Security
2 Minute Read
What Keeps the CISO Awake at Night? Four Dreaded Security Headlines
Would your organization's security team be prepared if these headlines appear in tomorrow's news?
Security
3 Minute Read
Domestic Intelligence Service of the Federal Republic of Germany Warns About Cyber Attacks
What's happened, how to investigate if you've been affected and what you should do next.