Latest Articles

Defending at Machine Speed: Guiding LLMs with Security Context
Security
7 Minute Read

Defending at Machine Speed: Guiding LLMs with Security Context

Enhance LLM performance for cybersecurity tasks with few-shot learning, RAG, & fine-tuning guide models for accurate PowerShell classification.
Splunk Security Content for Threat Detection & Response: May Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: May Recap

There are 13 new analytics and 4 new analytic stories now available in Splunk Enterprise Security via the ESCU application update process.
Innovations in Splunk Security Expands Unified TDIR Experience to On-Premises and FedRamp Moderate Environments
Security
3 Minute Read

Innovations in Splunk Security Expands Unified TDIR Experience to On-Premises and FedRamp Moderate Environments

Announcing the general availability of Splunk Enterprise Security 8.1, bringing unified TDIR workflows fueled by automation to both customer managed deployments and FedRAMP Moderate environments
From Instinct to Insight: Why Metrics Are Essential to Threat Hunting Success
Security
5 Minute Read

From Instinct to Insight: Why Metrics Are Essential to Threat Hunting Success

Splunker Tamara Chacon explores why metrics are critical to threat hunting success.
Securing the Network Edge: Cisco Secure Firewall Threat Defense Detections for Splunk
Security
14 Minute Read

Securing the Network Edge: Cisco Secure Firewall Threat Defense Detections for Splunk

Enhance your network security with Cisco Firepower Threat Defense and Splunk using out-of-the-box detections developed by Splunk's Threat Research Team.
Enter the SOC of the Future in Splunk’s State of Security 2025
Security
4 Minute Read

Enter the SOC of the Future in Splunk’s State of Security 2025

Splunk's State of Security 2025: The Stronger, Smarter SOC of the Future reveals the insights, aspirations, and challenges of security leaders.
Key Findings From a Recent Study on Data Management in the Modern Security Operations Center
Security
4 Minute Read

Key Findings From a Recent Study on Data Management in the Modern Security Operations Center

Learn about cloud storage preferences, data cost challenges, and best practices for optimizing your SOC's security posture and cost efficiency.
Breaking Down Termite Ransomware: Infection Methods and Detections
Security
8 Minute Read

Breaking Down Termite Ransomware: Infection Methods and Detections

Deep dive into Termite ransomware: Discover its infection methods, targeted vulnerabilities (like Cleo's CVE-2024-50623), and Splunk security detections.
Imposters at the Gate: Spotting Remote Employment Fraud Before It Crosses the Wire
Security
6 Minute Read

Imposters at the Gate: Spotting Remote Employment Fraud Before It Crosses the Wire

Remote Employment Fraud actors don’t steal credentials—they’re issued them. This blog explores early detection and why security can’t face this threat alone.