Security Blogs

Latest Articles

Next Level Automation: What’s New with Splunk Phantom
Security
1 Minute Read

Next Level Automation: What’s New with Splunk Phantom

With the release of Splunk Phantom 4.10.1, we now allow you to configure the number of playbook runners using Python 2 and Python 3. Learn more right here.
Visual Link Analysis with Splunk: Part 2 - The Visual Part
Security
4 Minute Read

Visual Link Analysis with Splunk: Part 2 - The Visual Part

Using Splunk for link analysis - part 2 covering visualizations of linked data.
Cybersecurity Today: Alice in Wonderland Meets the Matrix & Total Recall
Security
3 Minute Read

Cybersecurity Today: Alice in Wonderland Meets the Matrix & Total Recall

The scale of cyber attacks and the complexity of networks exacerbate the situation. Operators face three significant challenges: an IT security ecosystem that is fragmented and in flux, users that are both human and machine, and multiple threats with varying levels of severity and sophistication.