Security Blogs

Latest Articles

Fashionably Late: The Zero Trust Trend is Here to Stay
Security
3 Minute Read

Fashionably Late: The Zero Trust Trend is Here to Stay

Whether you were hip to the zero trust trend before it started being cool, or are arriving fashionably late, learn how to leverage a data-driven approach to achieve zero trust outcomes and improve the overall security capabilities of the organization in the process.
I Pity the Spool: Detecting PrintNightmare CVE-2021-34527
Security
7 Minute Read

I Pity the Spool: Detecting PrintNightmare CVE-2021-34527

Read on for details around Detect PrintNightmare (CVE-2021-34527), a critical vulnerability that affects the Print Spooler service and can perform remote code execution.
Staff Picks for Splunk Security Reading June 2021
Security
5 Minute Read

Staff Picks for Splunk Security Reading June 2021

SOARing to the Clouds with Splunk SOAR
Security
2 Minute Read

SOARing to the Clouds with Splunk SOAR

Now available as part of Splunk Cloud, Splunk SOAR further delivers on our promise to modernize security operations – read on to learn more.
Introducing the World’s First Modern Cloud-Based SecOps Platform: Splunk Security Cloud
Security
3 Minute Read

Introducing the World’s First Modern Cloud-Based SecOps Platform: Splunk Security Cloud

Announcing the new Splunk Security Cloud – the only data-centric modern security operations platform that delivers enterprise-grade advanced security analytics, automated security operations, and threat intelligence with an open, unparalleled ecosystem.
Splunk SOAR Playbooks: GCP Unusual Service Account Usage
Security
4 Minute Read

Splunk SOAR Playbooks: GCP Unusual Service Account Usage

In this new Splunk SOAR Playbook, we'll show how a Splunk Enterprise search can trigger automated enrichment, an analyst prompt, and rapid response actions to prevent damage caused by malicious account access.
Super Speed with Phantom Slash Commands
Security
2 Minute Read

Super Speed with Phantom Slash Commands

Splunker Olivia Courtney shares a walkthrough of what you can do with the power of Phantom Slash Commands to investigate Splunk Phantom events.
Detecting Password Spraying Attacks: Threat Research Release May 2021
Security
5 Minute Read

Detecting Password Spraying Attacks: Threat Research Release May 2021

The Splunk Threat Research team walks you through a new analytic story to help SOC analysts detect adversaries executing password spraying attacks, and highlights a few detections from the May 2021 releases.
A Deeper Dive into TruSTAR Intel Workflows
Security
4 Minute Read

A Deeper Dive into TruSTAR Intel Workflows

Learn about TruSTAR's API 2.0, featuring TruSTAR Intel Workflows. This blog post provides a look at some technical aspects of the Indicator Prioritization Intel Workflow.