Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Logging

5 Security Logging and Monitoring Mistakes to Avoid

As cybersecurity attack vectors evolve, security logging and monitoring are becoming even more important. Effective logging and monitoring enables organizations to detect and investigate security incidents quickly. Cloud-based attackers are getting more sophisticated, and often rely on stolen credentials to escalate privileges and move laterally within corporate IT networks.

Introducing the SIEM of the Future: Splunk Enterprise Security 8.0

It’s been an exciting year for Splunk Enterprise Security! In May, we celebrated being recognized as a Leader ten times in a row in the 2024 Gartner Magic Quadrant for SIEM. We’re not stopping there. We’re excited to introduce the SIEM of the Future to keep the momentum going. Splunk Enterprise Security 8.0 is available now in a private preview.

Why API Discovery Is Critical to Security

For Star Trek fans, space may be the final frontier, but in security, discovering Application Programming Interfaces (APIs) could be the technology equivalent. In the iconic episode “The Trouble with Tribbles,” the legendary starship Enterprise discovers a space station that becomes overwhelmed by little fluffy, purring, rapidly reproducing creatures called “tribbles.” In a modern IT department, APIs can be viewed as the digital tribble overwhelming security teams.

Understanding The Cyber Resilience Act (CRA)

The 2020 EU Cybersecurity Strategy, published by the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy, aimed to establish safeguards against security risks arising from increased digital connectivity. As part of the strategy, the strategy included updates to Directive (EU) 2022/2555 on measures for a high common level of cybersecurity across the Union (NIS2).

The Biggest Cybersecurity Challenges CISOs Face Today

CISOs face more cybersecurity challenges today than ever. As technology gets more advanced, so do the bad guys. Cyberattacks are becoming more clever and dangerous. On top of that, there’s no shortage of rules, regulations, and personal risk that CISOs must navigate. We surveyed 200 CISOs to better understand the biggest challenges they face today. Here’s some of what we learned.

Blackpoint Cyber & ChaosSearch | Customer Story

The leader in cybersecurity, Blackpoint Cyber, has teamed up with ChaosSearch, to create a next-generation data platform for log analytics for observability & security. We look forward to working with the Blackpoint team on tackling the rising costs & pain of ELK, while significantly increasing data retention, building a future-proof data platform for the increasingly challenging cybersecurity environment & AI-driven world.

Role-Based Access Control or Multitenancy-Which is Right for Your Organization?

Choosing the right software to defend your organization, both in real-time and in retrospect, is one of the most important decisions an organization can make. Security teams need to be able to view activity and affect access quickly, and that becomes more difficult at bigger, complex enterprises. A classical approach to this problem is role-based access control (RBAC), but for many organizations, multitenancy is a better fit.

Threat Detection and Incident Response with MITRE ATT&CK and Sigma Rules

Being a security analyst tracking down threats can feel like being the Wile E. Coyote to an attacker’s Road Runner. You’re fast, but they’re faster. You set up alerts, but they still manage to get past your defenses. You’re monitoring systems, but they’re still able to hide their criminal activities.