Security Blogs

Latest Articles

Staff Picks for Splunk Security Reading May 2021
Security
2 Minute Read

Staff Picks for Splunk Security Reading May 2021

Check out the favorite security-centric presentations, white papers and customer case studies from various peeps in the Splunk (or not) security world that WE think everyone should read.
Advanced Link Analysis, Part 3 - Visualizing Trillion Events, One Insight at a Time
Security
8 Minute Read

Advanced Link Analysis, Part 3 - Visualizing Trillion Events, One Insight at a Time

Learn how to get actionable insights from large datasets using link analysis in the third installment of our Advanced Link Analysis series, showcasing the interactive visualization of advanced link analysis with Splunk partner, SigBay.
SOAR in Seconds with Splunk Feature Overviews
Security
2 Minute Read

SOAR in Seconds with Splunk Feature Overviews

Get a quick overview of Splunk's SOAR tool, Splunk Phantom, and the main features within.
TruSTAR Intel Workflows Series: 3 Stages of the Prioritized Indicator Intel Workflow
Security
4 Minute Read

TruSTAR Intel Workflows Series: 3 Stages of the Prioritized Indicator Intel Workflow

This blog series explains our motivations for building this feature, how it works, and how users can better inform security operations. In this section, we dive into the three stages of the Prioritized Indicator Intel Workflow.
Little Code, Big Impact: Easily Scale your Security Automation with Splunk SOAR
Security
1 Minute Read

Little Code, Big Impact: Easily Scale your Security Automation with Splunk SOAR

Discover how our latest revision of Splunk Phantom’s 'custom functions' make playbook creation and execution faster and easier than ever with the ability to create shareable custom code across playbooks while introducing complex data objects into the playbook execution path.
DarkSide Ransomware: Splunk Threat Update and Detections
Security
6 Minute Read

DarkSide Ransomware: Splunk Threat Update and Detections

Splunk Threat Research Team (STRT) replicated the DarkSide Ransomware Attack and has released an Analytic Story with several detection searches directed at community shared IOCs.
Presidential Executive Order: “Collect and Preserve” Incident Data. Is this the Catalyst for Cybersecurity’s Black Box?
Security
3 Minute Read

Presidential Executive Order: “Collect and Preserve” Incident Data. Is this the Catalyst for Cybersecurity’s Black Box?

President Biden’s Executive Order (EO) on Improving the Nation’s Cybersecurity defines a solid path forward for the Federal government and its suppliers to address systemic problems in defending cyberspace.
A Threat As Old As The Internet: Why We Still Care About Malware (And Why You Should Too)
Security
3 Minute Read

A Threat As Old As The Internet: Why We Still Care About Malware (And Why You Should Too)

Splunk's CISO Yassir Abousselham dives into why — as IT and security leaders — we need to come up with comprehensive strategies to specifically mitigate malware attacks.
Threat Hunter Intelligence Report
Security
1 Minute Read

Threat Hunter Intelligence Report

Welcome to Splunk’s Threat Hunter Intelligence Report, a monthly series brought to you by Splunk’s threat hunting and intelligence (THI) team sharing the latest cybersecurity threats and trends to help organizations stay one step ahead of adversaries, one report at a time.