Security Blogs

Latest Articles

Staff Picks for Splunk Security Reading August 2022
Security
2 Minute Read

Staff Picks for Splunk Security Reading August 2022

Check out the latest staff picks from our Splunk security experts, featuring a list of presentations, whitepapers, and customer case studies that we feel are worth a read.
Introducing the Ransomware Content Browser
Security
2 Minute Read

Introducing the Ransomware Content Browser

Learn more about the Ransomware Content Browser recently released inside Splunk Security Essentials, aimed at helping customers combat the problem of ransomware.
Splunk Announces Participation in the Open Cybersecurity Schema Framework (OCSF) Project
Security
3 Minute Read

Splunk Announces Participation in the Open Cybersecurity Schema Framework (OCSF) Project

Announcing our participation as a co-founder of the new public Open Cybersecurity Schema Framework (OCSF) open-source project at Black Hat 2022.
Security Made Stronger with Splunk User Behavior Analytics (UBA) Version 5.1
Security
2 Minute Read

Security Made Stronger with Splunk User Behavior Analytics (UBA) Version 5.1

Announcing the availability of User Behavior Analytics (UBA) version 5.1
Staff Picks for Splunk Security Reading July 2022
Security
2 Minute Read

Staff Picks for Splunk Security Reading July 2022

Welcome to the Splunk staff picks blog. Each month, Splunk security experts curate a list of presentations, whitepapers, and customer case studies that we feel are worth a read.
ML Detection of Risky Command Exploit
Security
6 Minute Read

ML Detection of Risky Command Exploit

Discover how to use machine learning algorithms to develop methods for detecting misuse or abuse of risky SPL commands to further pinpoint a true security threat.
Splunk Security Essentials 3.6.0: A Holistic View of Your Security
Security
2 Minute Read

Splunk Security Essentials 3.6.0: A Holistic View of Your Security

Check out all the new features being released in Splunk Security Essentials 3.6.0.
3 Important German BSI Documents Every SIEM & SOC Manager Needs To Know About
Security
3 Minute Read

3 Important German BSI Documents Every SIEM & SOC Manager Needs To Know About

The German IT Security Act 2.0 (IT-SiG 2.0) has been in force for some time now. Due to this new law, significantly more German companies have been classified as operators of critial infrastructures (KRITIS) than ever. This is a major cause of headaches for many managers. In addition, IT departments are starting to ask themselves: "Are we now regarded as KRITIS"? And if so, "What do we have to take into consideration?" Splunker Matthias Maier shares the 3 most important BSI documents every SIEM and SOC manager needs to know about.
Introducing Splunk Attack Range v2.0
Security
6 Minute Read

Introducing Splunk Attack Range v2.0

The Splunk Attack Range project has officially reached the v2.0 release with a host of new features – get all the details from the Splunk Threat Research Team.