From investigating security incidents to triaging alerts and identifying data threats, security analysts play a pivotal role in thwarting organizational cybersecurity threats.
In this blog, the Splunk threat research team shows how to detect suspicious activity and possible abuse of AWS Permanent and Temporary credentials.
The best things come in threes and for the third year in a row, Splunkers down-under will take to the (virtual) thunderdome to battle it out for supreme bragging rights in the Australia & New Zealand Boss of the SOC (BOTS) Day held on August 20, 2020.
In part 2 of our 3-part series, we walk you through how to use Splunk Security-Content, Attack Range and CircleCI to do detection development, continuous testing and deployment as a workflow in your SOC.
These monthly postings will feature the favorite security-centric presentations, white papers and customer case studies from various peeps in the Splunk (or not) security world that we think everyone should read.
Today, we’re excited to reveal the first iteration of this new way forward for security operations, with the general availability (GA) of Splunk Mission Control.