Security Blogs

Latest Articles

Detecting the Sudo Baron Samedit Vulnerability and Attack
Security
3 Minute Read

Detecting the Sudo Baron Samedit Vulnerability and Attack

Looking for ways to detect and protect against the SUDO Baron Samedit vulnerability (CVE-2021-3156)? Look no further. In this blog we tell you how to proactively detect vulnerable servers using Splunk and also to detect malicious folks who are attempting to exploit this vulnerability for nefarious outcomes!
TruSTAR Enclave: Not Your Grandpa’s 'Trusted Circle'
Security
4 Minute Read

TruSTAR Enclave: Not Your Grandpa’s 'Trusted Circle'

TruSTAR’s Enclave technology is the most advanced cloud-based governance engine for enterprise cyber intelligence – read on to discover how it has evolved to meet the needs of integration, automation and intelligence sharing.
Visual Link Analysis with Splunk: Part 1 - Data Reduction
Security
3 Minute Read

Visual Link Analysis with Splunk: Part 1 - Data Reduction

Part 1 of a multi-part series exploring ways to use Splunk for link analysis. This blog focuses on data reduction.