Tag: Surge

Latest Articles

Defending at Machine-Speed: Accelerated Threat Hunting with Open Weight LLM Models
Security
5 Minute Read

Defending at Machine-Speed: Accelerated Threat Hunting with Open Weight LLM Models

Splunker Ryan Fetterman explains how Splunk DSDL 5.2 enhances cybersecurity operations, streamlining PowerShell script classification and reducing analyst workload by 250x.
Exploring AI for Vulnerability Investigation and Prioritisation
Security
5 Minute Read

Exploring AI for Vulnerability Investigation and Prioritisation

Splunker James Hodgkinson explains how AI-driven tools can revolutionize vulnerability investigation and prioritization.
Autonomous Adversaries: Are Blue Teams Ready for Cyberattacks To Go Agentic?
Security
6 Minute Read

Autonomous Adversaries: Are Blue Teams Ready for Cyberattacks To Go Agentic?

Explore the impact of autonomous adversaries on cybersecurity as AI and LLMs evolve.
Introducing DECEIVE: A Proof-of-Concept Honeypot Powered by AI
Security
4 Minute Read

Introducing DECEIVE: A Proof-of-Concept Honeypot Powered by AI

Explore DECEIVE: an AI-powered proof-of-concept honeypot by SURGe. Learn how AI simplifies cybersecurity with dynamic simulations and session summaries, paving the way for innovative security solutions.
Matching AI Strengths to Blue Team Needs
Security
6 Minute Read

Matching AI Strengths to Blue Team Needs

Discover how AI and Large Language Models (LLMs) enhance cybersecurity operations for Blue Teams.
Cybersecurity Awareness Month Spotlight: Insights from the Cisco Talos & SURGe Teams
Security
3 Minute Read

Cybersecurity Awareness Month Spotlight: Insights from the Cisco Talos & SURGe Teams

The Cisco Talos and SURGe by Splunk teams gathered for a special episode of Talos Takes filled with engaging cybersecurity discussions and candid opinions.
Observability Meets Security: Build a Baseline To Climb the PEAK
Security
8 Minute Read

Observability Meets Security: Build a Baseline To Climb the PEAK

Splunker James Hodgkinson looks at how to apply the baseline hunting process to some common O11y data sources and shows how the OpenTelemetry standard offers easier data analysis.
How To Start Threat Hunting: The Beginner's Guide
Security
6 Minute Read

How To Start Threat Hunting: The Beginner's Guide

Ready to hunt threats? Starting a hunt in a new data environment? This is the place to begin! We've got you covered in this threat hunting 101 tutorial.
Detecting & Hunting Named Pipes: A Splunk Tutorial
Security
12 Minute Read

Detecting & Hunting Named Pipes: A Splunk Tutorial

Named pipes can be threats, too. In this comprehensive article, we are going to talk about detecting, hunting and investigating named pipes.
/en_us/blog/fragments/subscribe-footer