Security Blogs

Latest Articles

Model-Assisted Threat Hunting (M-ATH) with the PEAK Framework
Security
9 Minute Read

Model-Assisted Threat Hunting (M-ATH) with the PEAK Framework

Welcome to the third entry in our introduction to the PEAK Threat Hunting Framework! Taking our detective theme to the next level, imagine a tough case where you need to call in a specialized investigator. For these unique cases, we can use algorithmically-driven approaches called Model-Assisted Threat Hunting (M-ATH).
Trust Unearned? Evaluating CA Trustworthiness Across 5 Billion Certificates
Security
10 Minute Read

Trust Unearned? Evaluating CA Trustworthiness Across 5 Billion Certificates

In this blog post, we dive into our recent research project, in which the Splunk SURGe team analyzed more than five billion TLS certificates to find out if the CAs we rely on are really worthy of our trust.
Splunk Field Hashing & Masking Capabilities for Compliance
Security
3 Minute Read

Splunk Field Hashing & Masking Capabilities for Compliance

Satisfy internal and external compliance requirements using Splunk standard components.