Tag: Surge

Latest Articles

AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Obey My Logs! AI-Powered Compromised Credential Detection
Security
13 Minute Read

Obey My Logs! AI-Powered Compromised Credential Detection

Splunker Shannon Davis shares a closer look into how to detect compromised credentials with AI-powered PLoB.
Introducing… The Threat Hunter’s Cookbook!
Security
1 Minute Read

Introducing… The Threat Hunter’s Cookbook!

The security experts on the SURGe team have released The Threat Hunter’s Cookbook, a hands-on guide for security practitioners that features actionable insights into threat hunting methods, ready-to-use queries, and more.
Defending at Machine Speed: Guiding LLMs with Security Context
Security
7 Minute Read

Defending at Machine Speed: Guiding LLMs with Security Context

Enhance LLM performance for cybersecurity tasks with few-shot learning, RAG, & fine-tuning guide models for accurate PowerShell classification.
From Data Chaos to Clarity: Splunk and AWS Power AI Readiness in APAC
Partners
3 Minute Read

From Data Chaos to Clarity: Splunk and AWS Power AI Readiness in APAC

For over a decade, Splunk and AWS have worked together to help organisations make sense of their data — securely, at scale, and in real time.
From Instinct to Insight: Why Metrics Are Essential to Threat Hunting Success
Security
5 Minute Read

From Instinct to Insight: Why Metrics Are Essential to Threat Hunting Success

Splunker Tamara Chacon explores why metrics are critical to threat hunting success.
Defending at Machine-Speed: Accelerated Threat Hunting with Open Weight LLM Models
Security
5 Minute Read

Defending at Machine-Speed: Accelerated Threat Hunting with Open Weight LLM Models

Splunker Ryan Fetterman explains how Splunk DSDL 5.2 enhances cybersecurity operations, streamlining PowerShell script classification and reducing analyst workload by 250x.
Exploring AI for Vulnerability Investigation and Prioritisation
Security
5 Minute Read

Exploring AI for Vulnerability Investigation and Prioritisation

Splunker James Hodgkinson explains how AI-driven tools can revolutionize vulnerability investigation and prioritization.
Autonomous Adversaries: Are Blue Teams Ready for Cyberattacks To Go Agentic?
Security
6 Minute Read

Autonomous Adversaries: Are Blue Teams Ready for Cyberattacks To Go Agentic?

Explore the impact of autonomous adversaries on cybersecurity as AI and LLMs evolve.
/en_us/blog/fragments/subscribe-footer