Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Exploring Security and Observability on Splunk Lantern

Your organization purchased Splunk Cloud Platform some time ago. Your environment is ingesting dozens of data sources and your team has expert level SPL skills. You've created easily consumable dashboards and reports for many different types of stakeholders and you've mastered alert fatigue. Your organization's return on investment both in Splunk and Splunk education is paying large dividends in terms of time saved managing threats and improved operational efficiency.

Data Center Security Explained: Concepts & Standards

Did you know that in the U.S. the average cost of a data breach is a whopping $8.64 million? As a business, securing your data must be your #1 priority. Data centers store personal, confidential and financial information about their customers, stakeholders and employers. Criminals can exploit such information, costing businesses millions of dollars to investigate and remediate. The damage is not only monetary — it can have significant impact on your brand image.

Threat Update: Industroyer2

The Splunk Threat Research Team (STRT) continues to monitor new relevant payloads to the ongoing conflict in Eastern Europe. One of these new payloads was found by the Ukranian CERT named “Industroyer2.” The name of this new payload references the original "Industroyer" malicious payload used against the country of Ukraine's power grid in 2016 and allegedly was able to affect a fifth of the power capacity of the city of Kyiv.

Penetration Testing: Practical Introduction & Tutorials

You’ve built an awesome business — it is booming and making money. You’ve streamlined all the processes and operations. Business is good. But, when you build something great, it attracts cyber criminals. Your business is valuable to you and cybercriminals can leverage it. That’s why security is important. You can use different security approaches to secure your application, infrastructure and network. In this post we’ll focus on one such approach: penetration testing.

Truth in Malvertising?

Splunk SURGe recently released a whitepaper, blog, and video that outline the encryption speeds of 10 different ransomware families. Early in our research, during the literature review phase, we came across another group that conducted a similar study on ransomware encryption speeds. Who was this group you ask? Well, it was actually one of the ransomware crews themselves.

Publish Your Splunk SOAR Apps Faster

The process for our technology partners to publish their SOAR Apps to Splunkbase just got faster and simpler. App updates are now automatically pulled from our partners’ GitHub repositories into the Splunkbase library in a matter of minutes. With 350+ SOAR Apps on Splunkbase across 200+ partners, this process improvement makes Splunk easier to integrate with and more importantly, provides our customers with even faster access to up-to-date Apps.