Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Splunk

Data Governance in 2023:Definition & Best Practices

The world is becoming more reliant on data through data analytics and AI, where a lack of data quality can cost 74% more time spent on non-value added tasks by employees. This makes proper data governance more crucial than ever. As organizations become data-driven and interact with more data than ever, understanding the ins and outs of data governance is essential for ensuring data quality, security, and regulatory compliance.

Deep learning in security: text-based phishing email detection with BERT model

Phishing emails are fraudulent or malicious emails that are designed to deceive recipients and trick them into revealing sensitive information, such as login credentials, financial details, or personal data. Phishing email contents usually employ various social engineering techniques that are likely to manipulate recipients, leading to significant damage to personal or corporate information security.

Data Loss Prevention (DLP): Definition, Components & Types

The importance of data security cannot be overstated. Data Loss Prevention (DLP) has emerged as a crucial component in safeguarding sensitive information and ensuring compliance with ever-evolving regulations. In this blog post, we'll share everything to know about DLP, exploring its definition, key components, types of solutions, importance, best practices, tools, and common challenges.

Coffee Talk with SURGe: The Interview Series featuring Jamie Williams

Join Ryan Kovar and special guest Jamie Williams, MITRE ATT&CK for Enterprise Lead and Principal Adversary Emulation Engineer, for a discussion about MITRE ATT&CK use cases and Jamie's essay in a new book by SURGe titled, "Bluenomicon: The Network Defender's Compendium.".

Today's Top Risk Management Frameworks

Business environments change every day. That’s why using a risk management framework is a crucial part of any organization. It helps manage different kinds of threats you face day in, day out. Organizations with robust RMFs are better prepared to thrive and adapt in this unpredictable world, ensuring their continued success and resilience. This article introduces risk management frameworks and explains the significance of using one in your organization.

Sharing is Not Caring: Hunting for Network Share Discovery

Organizations rely on interconnected systems to store, share and manage information. These ecosystems often incorporate network file shares, which act as repositories of various types of data within an organization. Unfortunately, it is not uncommon for sensitive files to find their way onto these network shares inadvertently with permissions that are too broad or not properly restricted.

What is Cloud Security? Types, Risks & Benefits Defined

With data breaches making the headlines almost daily, it can feel like you’re stuck in a never-ending discussion about how secure data is in the cloud. On one hand, cloud naysayers may be preaching cloud repatriation in response to the high profile cloud compromises of the last few years. On the other hand, being too sure of your data security is a major recipe for trouble — hubris has no place in cybersecurity.

Coffee Talk with SURGe: 2023-SEPT-05 Mudge Joins CISA, Qakbot Takedown, Infamous Chisel Malware

Grab a cup of coffee and join Mick Baccio, Ryan Kovar and Audra Streetman for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: Mick and Ryan competed in a 60 second charity challenge to share their favorite hack of all time before a deep dive on extortionware vs. ransomware.

Unifying Security and Observability to Strengthen Digital Resilience

In today's always-on, ever-connected world, keeping digital systems secure and reliable is not just a goal, but a business imperative — it is now a boardroom-level conversation. With the increasing complexity of digital systems and ever-growing event volume, organizations face a constant battle to protect their systems, data, and reputation from a myriad of threats. Simultaneously, they need to optimize system performance, identify bottlenecks, and enhance the overall user experience.