Security Blogs

Latest Articles

Deep Learning in Security: Text-based Phishing Email Detection with BERT Model
Security
4 Minute Read

Deep Learning in Security: Text-based Phishing Email Detection with BERT Model

We introduced a large language model (LLM)-based phishing email detector integrated into the Splunk DSDL app. We provide details on model training and evaluation, comparisons to other machine learning and deep learning algorithms as well as deployment approaches to Splunk in this blog.
Sharing is Not Caring: Hunting for Network Share Discovery
Security
9 Minute Read

Sharing is Not Caring: Hunting for Network Share Discovery

This post offers a practical guide to enhancing detection strategies against network share discovery, a technique often used by threat actors.
Staff Picks for Splunk Security Reading August 2023
Security
4 Minute Read

Staff Picks for Splunk Security Reading August 2023

Splunk security experts share a list of presentations, whitepapers, and customer case studies from August 2023 that they feel are worth a read.
Splunk Security Use Cases
Security
2 Minute Read

Splunk Security Use Cases

Key Threat Hunting Deliverables with PEAK
Security
4 Minute Read

Key Threat Hunting Deliverables with PEAK

When most people think of threat hunting, they think of uncovering unknown threats – but that is only one of many (better) reasons to show value with threat hunting.
Unified Strategies Across IT and Security for Cutting-Edge Detection, Investigation and Response
Security
4 Minute Read

Unified Strategies Across IT and Security for Cutting-Edge Detection, Investigation and Response

Splunk's Mike Horn shares a closer look at the value of a unified approach to security and observability.
Detecting Lateral Movement Using Splunk User Behavior Analytics
Security
8 Minute Read

Detecting Lateral Movement Using Splunk User Behavior Analytics

The blog is to introduce lateral movement detection using Splunk User Behavior Analytics (UBA)
Integrated Intelligence Enrichment With Threat Intelligence Management
Security
1 Minute Read

Integrated Intelligence Enrichment With Threat Intelligence Management

Threat Intelligence Management enables analysts to fully investigate security events or suspicious activity by providing the relevant and normalized intelligence to better understand threat context and accelerate time to triage.
Splunk SOAR Playbook of the Month: Investigations with Playbooks
Security
2 Minute Read

Splunk SOAR Playbook of the Month: Investigations with Playbooks

For this month’s edition of Playbook of the Month, we’ll look at how you can perform investigations at machine speed using Splunk SOAR and one of our investigation playbooks, Internal Host WinRM Investigate.