Splunk’s Response to the SolarWinds Cyberattacks

Since mid-December and throughout the holidays, I’ve been speaking with Splunk customers and our own team about the cyberattacks impacting the SolarWinds Orion software platform. Splunk was not directly affected by this event, but as a leader in security, we want to help the industry by providing tools, guidance and support. It is critical to our entire industry that we work as a community to counter cybersecurity threats and share information about events like these.

For background, here is a recap of what happened:

Splunk is doing everything we can to assist our customers who use SolarWinds Orion, and share relevant information with the larger community.

We’ve also taken action to better protect Splunk as a business:

Repercussions from the SolarWinds attack will continue into 2021. All of us at Splunk remain vigilant and committed to identifying various avenues to assist our customers, partners and industry organizations in their response. Be sure to visit Splunk’s SolarWinds response site for the latest materials and information.

----------------------------------------------------
Thanks!
Yassir Abousselham

Related Articles

Advanced Link Analysis: Part 2 - Implementing Link Analysis
Security
4 Minute Read

Advanced Link Analysis: Part 2 - Implementing Link Analysis

Learn how to step-by-step process to building the dashboard with Sigbay Link Analysis visualization app from scratch.
Which of Gartner’s 2019 Top 7 Security and Risk Management Trends Are Impacting Your Business? - Part II
Security
3 Minute Read

Which of Gartner’s 2019 Top 7 Security and Risk Management Trends Are Impacting Your Business? - Part II

Part 2 of our 3-part blog series, in which we take a closer look into Gartner Security and Risk Trends 2019 and give you suggestions on how to address them.
3 Important German BSI Documents Every SIEM & SOC Manager Needs To Know About
Security
3 Minute Read

3 Important German BSI Documents Every SIEM & SOC Manager Needs To Know About

The German IT Security Act 2.0 (IT-SiG 2.0) has been in force for some time now. Due to this new law, significantly more German companies have been classified as operators of critial infrastructures (KRITIS) than ever. This is a major cause of headaches for many managers. In addition, IT departments are starting to ask themselves: "Are we now regarded as KRITIS"? And if so, "What do we have to take into consideration?" Splunker Matthias Maier shares the 3 most important BSI documents every SIEM and SOC manager needs to know about.