Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

September 2022

Machine Learning in Security: NLP Based Risky SPL Detection with a Pre-trained Model

The Splunk Vulnerability Disclosure SVD-2022-0604 published the existence of an attack where the dashboards in certain Splunk Cloud Platform and Splunk Enterprise versions may let an attacker inject risky search commands into a form token.

Coffee Talk with SURGe: Ukraine War, GRU Hactivist Coordination, Network Monitoring, Optus Breach

Grab a cup of coffee and join Audra Streetman and special guests David Bianco and Haylee Mills for another episode of Coffee Talk with SURGe. The trio will discuss the latest cybersecurity news, including: Haylee and David competed in a 60 second charity challenge to explain the concept of domain shadowing. The team also discussed the Uber hack as it relates to general security practices at companies.

Top Cybersecurity Frameworks Today (And How To Choose)

With the easy availability of tools and knowledge, cyberattacks have run rampant, putting pressure on organizations to better defend themselves. Security is a continuous process that grows over time — exactly why organizations need to create a strong foundation. Two important questions every organization has asked themselves: Where do we start, and have we done enough?

Cyber Hygiene: Concepts and Best Practices for Cybersecurity

Cyber hygiene has become a highly visible topic in all business segments. Creating software and new features happens at a very fast pace — requiring lots of internal processes and operations to keep this up to date. However, it's also very important to be concerned with the fundamentals of information security in order to keep the company's digital assets protected. In this post, we'll discuss in detail the concept of cyber hygiene and some good practices to follow.

Improving Security: Updates to Classic (SimpleXML) Dashboards Containing External Links or Content

Classic (SimpleXML) dashboards are a powerful tool for you to share information with users and can include links for users to continue their investigations in other pages. As you likely already know, you can include external content in your Classic dashboard using HTML panels. You can also include external links or configure drilldowns to external URLs.

Security 101: Vulnerabilities, Threats & Risk Explained

In cybersecurity, the things to consider are endless. Before we get ahead of ourselves, let’s make sure we fully understand three fundamental concepts of security: In this article, we’ll look at these security concepts in depth and hear from industry experts. (For the latest and greatest in all things security, check out the Splunk Security Blog & these Cybersecurity and InfoSec Events & Conferences.)

Defense Department's Multi-Cloud Cloud Strategy: A Role for SIEM

It’s difficult to recall a time over the last ten years when cloud requirements were not at the forefront of the Defense Department’s modernization efforts. Cloud capability reviews and requirements, in some form, extend from the Pentagon’s net-centricy efforts — to the Joint Information Environment, Digital Modernization, and up through to today.