Skip to main content
false

Security Research Blogs

Latest Articles

Security 3 Min Read

Visual Link Analysis with Splunk: Part 1 - Data Reduction

Part 1 of a multi-part series exploring ways to use Splunk for link analysis. This blog focuses on data reduction.
Security 2 Min Read

The 10 Essential Capabilities of a Best-of-Breed SOAR

Security orchestration, automation and response (SOAR) tools are here to stay, do you have the best-of-breed SOAR in your security stack?
Security 9 Min Read

A Golden SAML Journey: SolarWinds Continued

The SolarWinds Orion compromise resulted in the first recorded use of Golden SAML in the wild. Learn how you can start detecting this in Splunk now.
Security 7 Min Read

Detecting Supernova Malware: SolarWinds Continued

Supernova exposes SolarWinds Orion to attack via an in-memory web shell. It needs to be patched and detections below can help identify adversary actions.
Security 2 Min Read

Top 5 Considerations for Implementing SOAR Technology

Security Orchestration, Automation, and Response (SOAR) solutions are becoming increasingly valuable. Before you get started, has your security operations team looked into the top 5 questions to consider?
Security 8 Min Read

Using Splunk to Detect Sunburst Backdoor

The Sunburst Backdoor threat truly burst on the scene as a send off for 2020. The good news is that the Splunk Security team has produced detections you can run in Splunk Enterprise Security to help you protect your environment from this sophisticated threat.
.conf & .conf Go 3 Min Read

Bigger is Better with Splunk TV: Highlights of .conf20

Check out Splunk TV's biggest announcements from .conf20!