Security Blogs

Latest Articles

Wire Data, Huh! What Is It Good For? Absolutely Everything, Say It Again Now!
Security
4 Minute Read

Wire Data, Huh! What Is It Good For? Absolutely Everything, Say It Again Now!

A brief overview of wire data, its uses and sources, and the new Splunk Essentials for Wire Data app
Modifying the Incident Review Page
Security
5 Minute Read

Modifying the Incident Review Page

How to modify the Incident Review page and add information to Notable Events in Splunk Enterprise Security
ATT&CK-ing the Adversary: Episode 3 – Operationalizing ATT&CK with Splunk
Security
4 Minute Read

ATT&CK-ing the Adversary: Episode 3 – Operationalizing ATT&CK with Splunk

In the final episode in the MITRE ATT&CK trilogy, we focus on applying what we learned and operationalizing it with ATT&CK to assist our security operations
ATT&CK-ing the Adversary: Episode 2 - Hunting with ATT&CK in Splunk
Security
5 Minute Read

ATT&CK-ing the Adversary: Episode 2 - Hunting with ATT&CK in Splunk

Using MITRE ATT&CK to focus your threat hunting in Splunk
| datamodel Endpoint
Security
4 Minute Read

| datamodel Endpoint

Discover what's new in Splunk Common Information Model (CIM) 4.12
Shifting Mindsets: Modernizing the Security Operations Center
Security
1 Minute Read

Shifting Mindsets: Modernizing the Security Operations Center

How to go from an 'old school' to a 'new school' defender
“Are We Secure?” Lessons Learned From The CISO Of A Leading Saudi Bank
Security
2 Minute Read

“Are We Secure?” Lessons Learned From The CISO Of A Leading Saudi Bank

A Splunk customer's presentation at Gartner’s 2018 Security Risk and Management Summit
Three Questions For Empowering Security: From Gartner’s Risk and Security Management Summit Europe
Security
1 Minute Read

Three Questions For Empowering Security: From Gartner’s Risk and Security Management Summit Europe

Key takeaways from this year's Gartner Risk and Security Management Summit Europe
I Azure You, This Will Be Useful
Security
3 Minute Read

I Azure You, This Will Be Useful

This blog post describes how to use Azure Active directory for basic hunting and discovery