Security Blogs
Latest Articles
template
category
category
security

Splunk and Tensorflow for Security: Catching the Fraudster with Behavior Biometrics
Raising the barrier for fraudsters and attackers: how to leverage Splunk and Deep Learning frameworks to discover Behavior Biometrics patterns within user activities

Punycode phishers - All you need to know
Unicode domains can be used for homograph attacks. Learn what they are and how users can be tricked.

Assigning Role Based Permissions in Splunk Enterprise Security
Learn how to add a new role in Enterprise Security and apply capabilities to it

Recap: Splunk @ Blackhat Europe 2016
Splunk at Blackhat Europe, a recap of schedule. Sharing latest tech on data analytics security, machine learning and threat intelligence gathering.

Playbook Series: Phishing: Automate and Orchestrate Your Investigation and Response
Respond with machine speed when a malicious phishing attack threatens your organization. Automation makes it possible.

Playbook: Investigate IP Address Performing Reconnaissance Activity
Phantom can receive reconnaissance alerts and automate key investigation steps to increase efficiency and speed decision making.


