Security Blogs

Latest Articles

Recap: Splunk @ Blackhat Europe 2016
Security
2 Minute Read

Recap: Splunk @ Blackhat Europe 2016

Splunk at Blackhat Europe, a recap of schedule. Sharing latest tech on data analytics security, machine learning and threat intelligence gathering.
Playbook Series: Phishing: Automate and Orchestrate Your Investigation and Response
Security
2 Minute Read

Playbook Series: Phishing: Automate and Orchestrate Your Investigation and Response

Respond with machine speed when a malicious phishing attack threatens your organization. Automation makes it possible.
Cybersecurity Week in Germany – Splunk wins Best SIEM
Security
1 Minute Read

Cybersecurity Week in Germany – Splunk wins Best SIEM

Playbook: Investigate IP Address Performing Reconnaissance Activity
Security
1 Minute Read

Playbook: Investigate IP Address Performing Reconnaissance Activity

Phantom can receive reconnaissance alerts and automate key investigation steps to increase efficiency and speed decision making.
8 reasons why you should splunk your backup solutions!
Security
2 Minute Read

8 reasons why you should splunk your backup solutions!

SSO without an Active Directory or LDAP provider
Security
4 Minute Read

SSO without an Active Directory or LDAP provider

Hackers are already in your environment – spot them with THOR and Splunk!
Security
2 Minute Read

Hackers are already in your environment – spot them with THOR and Splunk!

Random Words on Entropy and DNS
Security
4 Minute Read

Random Words on Entropy and DNS

Detecting dynamic DNS domains in Splunk
Security
3 Minute Read

Detecting dynamic DNS domains in Splunk

While useful legitimately, hackers can use dynamic DNS domains to change IP address rapidly & exploit via malware-evil.duckdns[.]org; how to protect against?