Security Blogs

Latest Articles

Tales of a Principal Threat Intelligence Analyst
Security
3 Minute Read

Tales of a Principal Threat Intelligence Analyst

Discover how threat intelligence can offer valuable insights to help fend off future attacks, no matter how covert or cunning they appear to be.
EO, EO, It’s Off to Work We Go! (Protecting Against the Threat of Ransomware with Splunk)
Security
10 Minute Read

EO, EO, It’s Off to Work We Go! (Protecting Against the Threat of Ransomware with Splunk)

We read the 'What We Urge You To Do To Protect Against The Threat of Ransomware' memo and Executive Order (EO14028) in-depth, and this blog is designed to provide you with the information and takeaways to start acting immediately.
Understanding Splunk Phantom’s Join Logic
Security
1 Minute Read

Understanding Splunk Phantom’s Join Logic

Have you ever built complex playbooks and tested them, only to find that they halted execution mid-stream? That’s probably because of your ‘join’ settings – read on to learn more.
Easily Automate Across Your AWS Environments with Splunk Phantom
Security
2 Minute Read

Easily Automate Across Your AWS Environments with Splunk Phantom

Splunk Phantom now has the flexibility to let you easily manage your AWS environment across hundreds or thousands of accounts – read on to learn more.
Partner Spotlight: IT-ISAC Members Automate and Simplify Intelligence Sharing with TruSTAR
Security
5 Minute Read

Partner Spotlight: IT-ISAC Members Automate and Simplify Intelligence Sharing with TruSTAR

We recently interviewed IT-ISAC Executive Director Scott Algeier to discuss why the organization chose to partner with TruSTAR, and the benefits its members are experiencing using TruSTAR to simplify integrations, automate data flows and make intel more actionable.
Staff Picks for Splunk Security Reading May 2021
Security
2 Minute Read

Staff Picks for Splunk Security Reading May 2021

Check out the favorite security-centric presentations, white papers and customer case studies from various peeps in the Splunk (or not) security world that WE think everyone should read.
Advanced Link Analysis, Part 3 - Visualizing Trillion Events, One Insight at a Time
Security
8 Minute Read

Advanced Link Analysis, Part 3 - Visualizing Trillion Events, One Insight at a Time

Learn how to get actionable insights from large datasets using link analysis in the third installment of our Advanced Link Analysis series, showcasing the interactive visualization of advanced link analysis with Splunk partner, SigBay.
SOAR in Seconds with Splunk Feature Overviews
Security
2 Minute Read

SOAR in Seconds with Splunk Feature Overviews

Get a quick overview of Splunk's SOAR tool, Splunk Phantom, and the main features within.
TruSTAR Intel Workflows Series: 3 Stages of the Prioritized Indicator Intel Workflow
Security
4 Minute Read

TruSTAR Intel Workflows Series: 3 Stages of the Prioritized Indicator Intel Workflow

This blog series explains our motivations for building this feature, how it works, and how users can better inform security operations. In this section, we dive into the three stages of the Prioritized Indicator Intel Workflow.