Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Splunk

Cyber Counterintelligence (CCI): Offensive & Defensive Strategies for Cybersecurity

Armed with innovative techniques, cyber attackers today come from various organized cybercrime groups, foreign intelligence services and other competitor organizations. With more sophisticated attacking techniques developed daily by such attackers, organizations must know their purpose and behaviors in advance — and devise strategies to avoid them. Cyber counterintelligence is an effective way to improve your cybersecurity posture.

CIO vs. CISO vs. CPO: What's The Difference?

Businesses been forced to step up their approach to security and privacy in the past few years due to: This growing digital complexity has led to the evolution of three vital executive-level positions: CIO, CISO and CPO — the Chief Information Officer, the Chief Information Security Officer and the Chief Privacy Officer. As three separate executive-level positions within companies centered around technology and cybersecurity, the lines between CIO, CISO and CPO can get blurry.

Manufacturing Predictions - the highlights for 2023

After having accelerated cloud and digital transformations during the pandemic, manufacturers might be forgiven for wanting to take a pit stop. But there is no time to slow down and rest on their laurels. On top of inflation, energy price shocks and economic uncertainty the technology landscape is shifting, faster than ever before — and so are the new kids on the block such as massive cyberattacks and sustainability imperatives.

Computer Security Incident Response Teams: CSIRT Models, Skills & Best Practices

If you are a fan of superhero movies like me, the assembling of the Avengers or Justice League at a pivotal moment to take on the villains is one exhilarating experience. That the collective strength, rather than individual brilliance, saves the day is a common them in most films of this genre. And the same can be applied to any organization that comes face to face with a major cybersecurity incident such as an enterprise-wide ransomware attack or a massive DDOS attack: the teams save the day.

Attack Surface Management (ASM): Examples, Software & the 4-Step ASM Lifecycle

A critical part of an organization’s overall cybersecurity strategy, Attack Surface Management (ASM) helps organizations to: This article describes ASM is, including why it is needed and how it works. At the end, I’ll discuss how software solutions can automate attack surface management. (This article was written by Shanika Wickramasinghe. See more of Shanika's contributions to Splunk Learn.)

Ransomware Families Bringing Home the Biggest Security Risks

Ransomware is the type of malware that locks you out of your own computer until you pay a ransom. This digital extortion is one of the most serious security threats facing the Internet today. Ransomware not only impacts unsuspecting Internet users, but business organizations, government institutions and even critical services such as utility, healthcare and emergency facilities. Ransomware has been around for many years.

Coffee Talk with SURGe!

Grab a cup of coffee and join David Bianco, Shannon Davis, and Audra Streetman for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: David Bianco and Shannon Davis also competed in a charity challenge comparing the pros and cons of the Pyramid of Pain, a conceptual model created by David to order indicators of compromise (IOCs) by the pain they cause adversaries when the IOCs are not available to them.

The Triple DES Intro: Triple Data Encryption Standard

Triple Data Encryption Standard (Triple DES) is a symmetric block cipher-based cryptography standard that uses fixed length keys with three passes of the DES algorithm. As a symmetric cryptographic scheme, DES implementations rely on the same secret keys shared between the sender and the recipient. As we’ll see later, Triple DES was developed as a way to prevent man in the middle attacks. Let’s take a look at Triple DES — and we’ll start first with DES.