false
Security Blogs
Security
3 Min Read
Announcing the availability of Cisco Talos Incident Response services to Splunk customers.

Latest Articles

Security 3 Min Read

Detecting Typosquatting, Phishing, and Corporate Espionage with Enterprise Security Content Update

Splunk’s Enterprise Security Content Update (ESCU) app can provide you with early warnings and situational awareness—powerful elements of an effective defense against adversaries
Security 4 Min Read

Tall Tales of Hunting with TLS/SSL Certificates

TLS and SSL certificates are a great way to hunt advanced adversaries. Collect them with Splunk Stream, Bro, or Suricata and hunt in your own data!
Security 2 Min Read

Splunk Named a Leader in Gartner SIEM Magic Quadrant for the Fifth Straight Year

Gartner's 2017 Magic Quadrant for Security Information and Event Management names Splunk a leader for the fifth straight year
Security 1 Min Read

What’s Cyber Security Week like for Splunk? it-sa gold!

Two gold awards and a successful it-sa event - that's how Splunk does Cyber Security Week!
Security 3 Min Read

What You Need to Know About Boss of the SOC

We introduced a new security activity at .conf2016 called “Boss of the SOC” (or BOTS), born from our belief that learning can be both realistic and fun.
Security 1 Min Read

The GDPR: Ready for the wakeup call from your Data Privacy Officer?

How machine data can help organisations prepare for GDPR and support their compliance programmes
Security 2 Min Read

What hygiene has to do with security: Infosec17 Recap

In a wrap up of Infosecurity Europe 2017, Matthias Maier shares the topics, trends and big win of the week.
Security 8 Min Read

Splunk and Tensorflow for Security: Catching the Fraudster with Behavior Biometrics

Raising the barrier for fraudsters and attackers: how to leverage Splunk and Deep Learning frameworks to discover Behavior Biometrics patterns within user activities
Security 2 Min Read

Punycode phishers - All you need to know

Unicode domains can be used for homograph attacks. Learn what they are and how users can be tricked.
Security 2 Min Read

Assigning Role Based Permissions in Splunk Enterprise Security

Learn how to add a new role in Enterprise Security and apply capabilities to it
Security 2 Min Read

Recap: Splunk @ Blackhat Europe 2016

Splunk at Blackhat Europe, a recap of schedule. Sharing latest tech on data analytics security, machine learning and threat intelligence gathering.
Security 2 Min Read

Playbook Series: Phishing: Automate and Orchestrate Your Investigation and Response

Respond with machine speed when a malicious phishing attack threatens your organization. Automation makes it possible.
Security 1 Min Read

Playbook: Investigate IP Address Performing Reconnaissance Activity

Phantom can receive reconnaissance alerts and automate key investigation steps to increase efficiency and speed decision making.