Security Blogs

Latest Articles

Top 3 Market Trends for SOAR Solutions
Security
3 Minute Read

Top 3 Market Trends for SOAR Solutions

Lear more about the general market trends for SOAR, investment recommendations, and how Splunk Phantom aligns with Gartner’s vision for SOAR.
Visual Link Analysis with Splunk: Part 3 - Tying Up Loose Ends
Security
5 Minute Read

Visual Link Analysis with Splunk: Part 3 - Tying Up Loose Ends

Using Splunk for Link Analysis part 3, addressing loose ends with visual link analysis.
Staff Picks for Splunk Security Reading January 2021
Security
3 Minute Read

Staff Picks for Splunk Security Reading January 2021

These monthly postings will feature the favorite security-centric presentations, white papers and customer case studies from various peeps in the Splunk (or not) security world that WE think everyone should read. If you would like to read other months, please take a peek at previous posts in the "Staff Picks" series!
Next Level Automation: What’s New with Splunk Phantom
Security
1 Minute Read

Next Level Automation: What’s New with Splunk Phantom

With the release of Splunk Phantom 4.10.1, we now allow you to configure the number of playbook runners using Python 2 and Python 3. Learn more right here.
Visual Link Analysis with Splunk: Part 2 - The Visual Part
Security
4 Minute Read

Visual Link Analysis with Splunk: Part 2 - The Visual Part

Using Splunk for link analysis - part 2 covering visualizations of linked data.
Cybersecurity Today: Alice in Wonderland Meets the Matrix & Total Recall
Security
3 Minute Read

Cybersecurity Today: Alice in Wonderland Meets the Matrix & Total Recall

The scale of cyber attacks and the complexity of networks exacerbate the situation. Operators face three significant challenges: an IT security ecosystem that is fragmented and in flux, users that are both human and machine, and multiple threats with varying levels of severity and sophistication.
Detecting the Sudo Baron Samedit Vulnerability and Attack
Security
3 Minute Read

Detecting the Sudo Baron Samedit Vulnerability and Attack

Looking for ways to detect and protect against the SUDO Baron Samedit vulnerability (CVE-2021-3156)? Look no further. In this blog we tell you how to proactively detect vulnerable servers using Splunk and also to detect malicious folks who are attempting to exploit this vulnerability for nefarious outcomes!
TruSTAR Enclave: Not Your Grandpa’s 'Trusted Circle'
Security
4 Minute Read

TruSTAR Enclave: Not Your Grandpa’s 'Trusted Circle'

TruSTAR’s Enclave technology is the most advanced cloud-based governance engine for enterprise cyber intelligence – read on to discover how it has evolved to meet the needs of integration, automation and intelligence sharing.
Visual Link Analysis with Splunk: Part 1 - Data Reduction
Security
3 Minute Read

Visual Link Analysis with Splunk: Part 1 - Data Reduction

Part 1 of a multi-part series exploring ways to use Splunk for link analysis. This blog focuses on data reduction.