Security Blogs
Latest Articles
template
category
category
security

Splunk Security Content for Threat Detection & Response: May Recap
There are 13 new analytics and 4 new analytic stories now available in Splunk Enterprise Security via the ESCU application update process.

Innovations in Splunk Security Expands Unified TDIR Experience to On-Premises and FedRamp Moderate Environments
Announcing the general availability of Splunk Enterprise Security 8.1, bringing unified TDIR workflows fueled by automation to both customer managed deployments and FedRAMP Moderate environments

From Instinct to Insight: Why Metrics Are Essential to Threat Hunting Success
Splunker Tamara Chacon explores why metrics are critical to threat hunting success.

Securing the Network Edge: Cisco Secure Firewall Threat Defense Detections for Splunk
Enhance your network security with Cisco Firepower Threat Defense and Splunk using out-of-the-box detections developed by Splunk's Threat Research Team.

Enter the SOC of the Future in Splunk’s State of Security 2025
Splunk's State of Security 2025: The Stronger, Smarter SOC of the Future reveals the insights, aspirations, and challenges of security leaders.

Key Findings From a Recent Study on Data Management in the Modern Security Operations Center
Learn about cloud storage preferences, data cost challenges, and best practices for optimizing your SOC's security posture and cost efficiency.

Breaking Down Termite Ransomware: Infection Methods and Detections
Deep dive into Termite ransomware: Discover its infection methods, targeted vulnerabilities (like Cleo's CVE-2024-50623), and Splunk security detections.

Imposters at the Gate: Spotting Remote Employment Fraud Before It Crosses the Wire
Remote Employment Fraud actors don’t steal credentials—they’re issued them. This blog explores early detection and why security can’t face this threat alone.

Australia Is Investing in Resilience – Are Businesses Ready?
Splunker Craig Bates explains why the most immediate — and underestimated — consequence of disruption isn’t always data loss. It’s downtime.