Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

7 Steps to an Efficient Security Operations Center Design

In the original Star Trek television show, Captain Kirk would slightly recline in a command chair with various buttons that allowed him to deploy different technologies. Regardless of the alien threat, he had the necessary tools at his disposal to protect the Enterprise and his staff. An organization’s security operations center (SOC) acts as the Captain Kirk “command chair” for all security activities.

Unlock Deeper Insights: Mastering Cloudflare Log Explorer for Better Security & Performance

Cloudflare Log Explorer is the native observability and forensics tool designed to give security teams and developers unparalleled, granular access to Cloudflare traffic logs directly within the dashboard. Key benefits include: Understanding your traffic patterns is fundamental to optimizing for peak performance and maintaining a robust security posture.

Hashing in Cryptography Explained: How It Works, Algorithms, and Real-World Uses

Hashing takes your data (like a password or file) and converts it into a fixed-length code that can’t be reversed. This makes it nearly impossible for attackers to figure out what the original data was, even if they steal the hash. In this article, I’ll explain hashing in detail, including its working principles, applications, the algorithms behind it, and how to apply it correctly.

Zero-shot Security Classification with Foundation-Sec-8B and Splunk DSDL

Earlier this year, we showcased how the Foundation-Sec-8B model’s chat capabilities can be leveraged within the Splunk App for Data Science and Deep Learning (DSDL) to summarize security events and provide detection suggestions. Building on its robust security expertise, Foundation-Sec-8B also supports zero-shot classification for a wide range of security tasks.

Overcoming Cybersecurity and Risk Management Challenges

Every time you leave your home, you take various risks, like being in a car accident or being struck down by a meteor. In some cases, like the meteor, the likelihood of the event is so low as to be nearly nonexistent. In others, like the car accident, the likelihood might be higher. Similarly, every technology that you connect to your networks creates a cybersecurity security risk. Any device or application that connects to the public internet can be an entry point for attackers.

Digital Resilience for State and Local Governments (Part Two)

In the first part of our series, we examined the challenges facing state and local governments as they work to secure and maintain the availability of increasingly complex digital systems. Today, we turn our focus to how collaboration—powered by shared data platforms like Splunk—can enhance incident response and overall digital resilience.

How Graylog Uses Explainable AI to Help Security Teams

Security teams face an endless stream of alerts, false positives, and investigation backlogs. Every second counts, yet many AI-driven tools promise to handle everything for you that leaves analysts uncertain about how conclusions were made. Graylog takes a different path. The company develops assistive AI that helps analysts make faster, smarter calls with context, transparency, and control. No black boxes. No mystery logic.

Logs & Lattes: Episode 2 - From Noise to Action: Smarter Security Ops That Reduce Risk

Security teams are overwhelmed by alerts, but which ones really matter? In this episode of Logs & Lattes, host Palmer Wallace talks with Rich Murphy, Senior Product Manager at Graylog, about how smarter security operations help teams cut through the noise and focus on what truly reduces risk. From alert fatigue to risk-first response, they unpack practical ways to prioritize real threats, automate with context, and make incident response faster and more effective. Learn how modern SOCs are evolving beyond alert overload to focus on meaningful, risk-based action.

From Tool Sprawl to One Platform: How Graylog Simplifies Security Visibility

Security operations are buried under too many tools. Analysts switch between consoles, piece together context by hand, and burn valuable hours reconciling data that should already work together. According to Gartner, security leaders use an average of 19 different tools, and 80% say this level of complexity creates blind spots. This fragmentation slows down detection and response, drives up costs, and wears out teams that are already stretched thin.

Splunk Ranked Number 1 in the 2025 Gartner Critical Capabilities for Security Information and Event Management Use Cases

In addition to Splunk’s recognition as an 11-time Leader in the 2025 Gartner Magic Quadrant for Security Information and Event Management (SIEM), we are honored to announce that Splunk has been ranked as the SIEM solution in all three Use Cases for the second consecutive time in the 2025 Gartner Critical Capabilities for Security Information and Event Management report.