Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Splunk

Splunk SOAR Playbooks: TruSTAR Indicator Enrichment

SOAR use cases come in all shapes and sizes, but almost all of them rely on threat intelligence to determine the risk posed by the various indicators in the event. Our two new community playbooks leverage Splunk Intelligence Management (previously TruSTAR) to gather intelligence about indicators and enable rapid manual response by an analyst within a single prompt.

Active Directory Lateral Movement Detection: Threat Research Release, November 2021

The Splunk Threat Research Team recently updated the Active Directory Lateral Movement analytic story to help security operations center (SOC) analysts detect adversaries executing these techniques within Windows Active Directory (AD) environments. In this blog post, we’ll describe some of the detection opportunities available to cyber defenders and highlight detections from the analytic story.

Log Jammin'- Detecting Log4j 2 RCE Using Splunk

Authors and Contributors: As always, security at Splunk is a family business. Credit to authors and collaborators: Ryan Kovar, Shannon Davis, Marcus LaFerrera, John Stoner, James Brodsky, Dave Herrald, Audra Streetman, Johan Bjerke, Drew Church, Mick Baccio, Lily Lee, Tamara Chacon, Ryan Becwar. If you want just to see how to find detections for the Log4j 2 RCE, skip down to the “detections” sections.

Splunk TV - TV Companion

Introducing Splunk TV Companion, an iPad App that allows you to remotely control the content of multiple TVs. Save a dashboard layout on multiple TVs as a shortcut to quickly switch content when responding to alerts, or or split a single dashboard across a grid of TVs. Whether you have several TVs in a single location or are remotely managing a group of TVs across the globe, use Splunk TV to coordinate your workforce around important events from a central location and rapidly bring dashboards to the attention of those who need it.

Splunk Live Chat with The Hill: Cybersecurity Trends in the Public Sector

Join the LIVE cybersecurity discussion featuring: Topic: How cybersecurity in the public sector space has shifted over the course of the last year due to the introduction of cybersecurity legislation and federal agencies’ focus on Zero Trust as well as key federal certifications like FedRAMP and IL5.