Security Blogs

Latest Articles

Punycode phishers - All you need to know
Security
2 Minute Read

Punycode phishers - All you need to know

Unicode domains can be used for homograph attacks. Learn what they are and how users can be tricked.
Assigning Role Based Permissions in Splunk Enterprise Security
Security
2 Minute Read

Assigning Role Based Permissions in Splunk Enterprise Security

Learn how to add a new role in Enterprise Security and apply capabilities to it
Playbook: Triage Reconnaissance Alerts
Security
1 Minute Read

Playbook: Triage Reconnaissance Alerts