Skip to main content
 SURGe  SURGe

Your trusted advisor for timely security research and guidance

Detecting Supply Chain Attacks

Using Splunk and JA3/s hashes to detect malicious activity on critical servers

detecting supply chain attacks detecting supply chain attacks

Rapid response guides

Initial incident response techniques to empower blue teams across the globe

Conversations with experts  

Splunk security experts in action to help organizations stay ahead of threats

splunks response to the solwarwinds splunks response to the solwarwinds

7:35 min

Splunk's Response to the SolarWinds Cyberattacks

CISO Yassir Abousselham addresses SolarWinds

The State of Cloud-Driven Transformation The State of Cloud-Driven Transformation

51:13 min

Security Experts Discuss SolarWinds Attack

Hear from Splunk security experts about the SolarWinds hack

Do more with Splunk

Leverage Splunk’s people, processes and technologies to help organizations protect their businesses

SURGe Alerts

Sign up to receive timely security content from SURGe.