Security Blogs

Latest Articles

Cloak and Firewall: Exposing Netsh’s Hidden Command Tricks
Security
10 Minute Read

Cloak and Firewall: Exposing Netsh’s Hidden Command Tricks

Learn about hidden Netsh command tricks, detection methods, and Splunk security detections to protect your Windows systems.
A Data-Driven Approach to Windows Advanced Audit Policy – What to Enable and Why
Security
14 Minute Read

A Data-Driven Approach to Windows Advanced Audit Policy – What to Enable and Why

Maximize visibility without overwhelming your SIEM with this data-driven guide to Windows Advanced Audit Policy.
Splunk at RSAC™ 2025: Helping Users Build the SOC of the Future
Security
1 Minute Read

Splunk at RSAC™ 2025: Helping Users Build the SOC of the Future

Join Splunk at RSAC™ 2025 to discover cutting-edge security solutions for building the SOC of the Future. Explore data management, SIEM advancements, and more.
Supercharge Your SOC Investigations with Splunk SOAR 6.4
Security
4 Minute Read

Supercharge Your SOC Investigations with Splunk SOAR 6.4

Splunker Nick Hunter explains how to integrate Cisco Talos threat intelligence, leverage Azure scalability, and streamline investigations.
The High Cost of Security Investigations
Security
8 Minute Read

The High Cost of Security Investigations

Splunk Asset & Risk Intelligence (ARI) can significantly reduce investigation costs, improve analyst efficiency, and accelerate threat containment.
Splunk Security Ops: Building the Blueprint for Success
Security
3 Minute Read

Splunk Security Ops: Building the Blueprint for Success

Learn how Splunk Global Security runs ops at scale and enables the business by focusing on what matters—solving problems through data, automation, and collaboration.
Sequenced Event Templates via Risk-based Alerting
Security
3 Minute Read

Sequenced Event Templates via Risk-based Alerting

Splunker Haylee Mills explains how to convert sequenced events into actionable insights using SPL techniques to enhance anomaly detection and improve security analytics.
SOAR: Transforming Security and IT
Security
2 Minute Read

SOAR: Transforming Security and IT

Splunker Kassandra Murphy explains how to streamline workflows and boost efficiency across your organization with intelligent orchestration and automation.
Logs Are for Campfires: Integrate and Innovate With Splunk Asset and Risk Intelligence
Security
4 Minute Read

Logs Are for Campfires: Integrate and Innovate With Splunk Asset and Risk Intelligence

Splunker Jerald Perry explains how to stay ahead of threats with streamlined workflows and comprehensive insights into your security posture.