Latest Articles
displayMode
paginated
category
Security
showImagesOnMobile
false

Security
3 Minute Read
What You Need to Know About Boss of the SOC
We introduced a new security activity at .conf2016 called “Boss of the SOC” (or BOTS), born from our belief that learning can be both realistic and fun.

Security
1 Minute Read
The GDPR: Ready for the wakeup call from your Data Privacy Officer?
How machine data can help organisations prepare for GDPR and support their compliance programmes

Security
2 Minute Read
What hygiene has to do with security: Infosec17 Recap
In a wrap up of Infosecurity Europe 2017, Matthias Maier shares the topics, trends and big win of the week.

Security
8 Minute Read
Splunk and Tensorflow for Security: Catching the Fraudster with Behavior Biometrics
Raising the barrier for fraudsters and attackers: how to leverage Splunk and Deep Learning frameworks to discover Behavior Biometrics patterns within user activities

Security
2 Minute Read
Punycode phishers - All you need to know
Unicode domains can be used for homograph attacks. Learn what they are and how users can be tricked.

Security
2 Minute Read
Assigning Role Based Permissions in Splunk Enterprise Security
Learn how to add a new role in Enterprise Security and apply capabilities to it

Security
1 Minute Read
Playbook: Triage Reconnaissance Alerts

Security
2 Minute Read
Recap: Splunk @ Blackhat Europe 2016
Splunk at Blackhat Europe, a recap of schedule. Sharing latest tech on data analytics security, machine learning and threat intelligence gathering.

Security
2 Minute Read
Playbook Series: Phishing: Automate and Orchestrate Your Investigation and Response
Respond with machine speed when a malicious phishing attack threatens your organization. Automation makes it possible.