Security Blogs

Latest Articles

Guided Automation Using Real Incident Data for Easier Playbook Building in Splunk SOAR
Security
2 Minute Read

Guided Automation Using Real Incident Data for Easier Playbook Building in Splunk SOAR

Build powerful playbooks in Splunk SOAR faster and easier with guided automation, using real incident data to streamline security responses in seconds.
Logs Are for Campfires: This Is Your Data!
Security
4 Minute Read

Logs Are for Campfires: This Is Your Data!

Splunker Jerald Perry shares how log data fuels insights, security, and efficiency, making it as impactful as Big Data for smarter decisions.
Federated Analytics: Analyze Data Wherever It Resides for Rapid and Holistic Security Visibility
Security
6 Minute Read

Federated Analytics: Analyze Data Wherever It Resides for Rapid and Holistic Security Visibility

Federated Analytics is now generally available as a premium add-on feature for Splunk Cloud Platform and Splunk Enterprise Security.
Unify and Automate TDIR Workflows with Splunk SOAR 6.3 and Splunk Enterprise Security 8.0
Security
2 Minute Read

Unify and Automate TDIR Workflows with Splunk SOAR 6.3 and Splunk Enterprise Security 8.0

Splunk SOAR 6.3 and Enterprise Security 8.0 make it easier to unify and automate your threat detection, investigation, and response workflows.
Splunk SOAR Prompt-Driven Automation: Reduce MTTR with Collaborative SecOps
Security
2 Minute Read

Splunk SOAR Prompt-Driven Automation: Reduce MTTR with Collaborative SecOps

Get started with prompt-driven automation today with the latest version of Splunk SOAR.
Announcing the General Availability of Splunk® Enterprise Security 8.0
Security
3 Minute Read

Announcing the General Availability of Splunk® Enterprise Security 8.0

We are thrilled to announce Splunk Enterprise Security 8.0 is now generally available.
Cybersecurity Awareness Month Spotlight: Insights from the Cisco Talos & SURGe Teams
Security
3 Minute Read

Cybersecurity Awareness Month Spotlight: Insights from the Cisco Talos & SURGe Teams

The Cisco Talos and SURGe by Splunk teams gathered for a special episode of Talos Takes filled with engaging cybersecurity discussions and candid opinions.
ValleyRAT Insights: Tactics, Techniques, and Detection Methods
Security
12 Minute Read

ValleyRAT Insights: Tactics, Techniques, and Detection Methods

The Splunk Threat Research Team conducts an analysis for several variants of ValleyRAT’s malware samples to extract its MITRE ATT&CK tactics, techniques, and procedures (TTPs).
Fueling the SOC of the Future with Built-in Threat Research and Detections in Splunk Enterprise Security
Security
3 Minute Read

Fueling the SOC of the Future with Built-in Threat Research and Detections in Splunk Enterprise Security

The Splunk Threat Research Team develops security resources and content that helps enhance your ability to detect and respond to advanced threats.