Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Splunk

Using Splunk to Secure Your Productivity and Team Collaboration Environment

Productivity and collaboration tools are key components for any business today – we use mail, docs, spreadsheets, shared whiteboards and many other cool tools daily. In this post, we will talk about how Splunk helps teams work and collaborate securely while using Google Chrome and Google Workspace.

Do More with Splunk Security Essentials 3.7.0

We know the time between Thanksgiving and New Year’s is typically slow so we wanted to bring some early holiday cheer to you through the most downloaded (and free) app on Splunkbase, Splunk Security Essentials (SSE). Starting Dec. 7, Splunk Security Essentials 3.7.0 is Generally Available. We have some amazing updates in the SSE 3.7.0 release, so let’s dive right into the updates.

Splunk Named a Leader in the 2022 IDC MarketScape for SIEM

Splunk has been named a Leader in the IDC MarketScape: Worldwide SIEM 2022 Vendor Assessment (doc #US49029922, November 2022). We believe this recognition is a testament to our commitment to delivering a best-in-class, data-centric security analytics solution that helps our customers accelerate threat detection and investigations, and achieve cybersecurity resilience.

Machine Learning in Security: Deep Learning Based DGA Detection with a Pre-trained Model

The SMLS team enables Splunk customers to find obscure and buried threats in large amounts of data through expert analytics. This work is part of a set of machine learning detections built by a specialized team of security-focused data scientists working in concert with Splunk’s threat research teams to help Splunk customers sift through vast amounts of data to identify and alert users of suspicious content.

DevSecOps: The What, Why, Who, and How

By way of a brief introduction, I have had a 25+ year career in technology, and this has come with some wonderful experiences and opportunities along the way. One constant throughout my journey has been a need to increasingly leverage data, enabling informed decisions (even automated) at all levels to ensure: secure, high performing and observable products and services are available to the customers and partners I’ve been supporting.

Data Encryption Methods & Types: Beginner's Guide To Encryption

Data encryption is one of the many ways organizations can protect their data. Encryption turns plaintext (readable data) into ciphertext (randomized data), which requires the use of a unique cryptographic key for interpretation. In other words, encryption is a security measure used to scramble data so that it can only be read by authorized personnel.

EU NIS2 Directive | Splunk Fireside Chat

Watch this fireside chat to find out what NIS2 is and what the new obligations are under this new EU directive. We'll talk about why it should be taken more seriously and how Splunk can help organisations comply with incoming regulations. Our Splunk Experts: Clara Lemaire, Director for European Government Affairs Kirsty Paine, EMEA Strategic Adviso Matthias Maier, Product Marketing Director.

How Good is ClamAV at Detecting Commodity Malware?

"People tell you who they are, but we ignore it, because we want them to be who we want them to be.” - Don Draper Earlier this year we announced some security enhancements to how we handle submissions to Splunkbase. The simple statement is we are making things faster/cheaper/better where Splunkbase security is concerned. Faster in that it takes less time for a developer to get an app into our platform. Cheaper in that it’s more automated.

The CISO Role: What Does a Chief Information Security Officer Do?

With the high rate of cyberattacks today, the role of a chief information security officer (CISO) has become more important — and much more visible. Businesses have been forced to invest in guarding their infrastructures, networks and sensitive data. This blog post will take a look at the basics of a CISO, as well as the CISO's main tasks and responsibilities.