Security Blogs

Latest Articles

Sequenced Event Templates via Risk-based Alerting
Security
3 Minute Read

Sequenced Event Templates via Risk-based Alerting

Splunker Haylee Mills explains how to convert sequenced events into actionable insights using SPL techniques to enhance anomaly detection and improve security analytics.
SOAR: Transforming Security and IT
Security
2 Minute Read

SOAR: Transforming Security and IT

Splunker Kassandra Murphy explains how to streamline workflows and boost efficiency across your organization with intelligent orchestration and automation.
Logs Are for Campfires: Integrate and Innovate With Splunk Asset and Risk Intelligence
Security
4 Minute Read

Logs Are for Campfires: Integrate and Innovate With Splunk Asset and Risk Intelligence

Splunker Jerald Perry explains how to stay ahead of threats with streamlined workflows and comprehensive insights into your security posture.
Defending at Machine-Speed: Accelerated Threat Hunting with Open Weight LLM Models
Security
5 Minute Read

Defending at Machine-Speed: Accelerated Threat Hunting with Open Weight LLM Models

Splunker Ryan Fetterman explains how Splunk DSDL 5.2 enhances cybersecurity operations, streamlining PowerShell script classification and reducing analyst workload by 250x.
Sinister SQL Queries and How to Catch Them
Security
16 Minute Read

Sinister SQL Queries and How to Catch Them

Discover comprehensive strategies for detecting and mitigating SQL Server attacks.
SNARE: The Hunters Guide to Documentation
Security
6 Minute Read

SNARE: The Hunters Guide to Documentation

Discover the SNARE framework for effective threat hunting documentation.
Exploring AI for Vulnerability Investigation and Prioritisation
Security
5 Minute Read

Exploring AI for Vulnerability Investigation and Prioritisation

Splunker James Hodgkinson explains how AI-driven tools can revolutionize vulnerability investigation and prioritization.
Infostealer Campaign against ISPs
Security
20 Minute Read

Infostealer Campaign against ISPs

The Splunk Threat Research Team observed actors performing minimal intrusive operations to avoid detection, with the exception of artifacts created by accounts already compromised.
Why Security Teams Choose Splunk Enterprise Security: Three Core Benefits That Transform SecOps
Security
4 Minute Read

Why Security Teams Choose Splunk Enterprise Security: Three Core Benefits That Transform SecOps

Discover how Splunk Enterprise Security transforms SecOps with comprehensive visibility, contextual threat detection, and efficient operations. Learn from PeerSpot users how this leading SIEM solution enhances security management and improves threat response.