Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

2022: A deluge of awards for Splunk France

In 2021, I wrote a blog post congratulating the Splunk France team on winning several awards. In 2022, they won even more... This is a quote from the former Arsenal manager Arsène Wenger, which I think is particularly apt. By winning multiple awards, specifically related to cybersecurity, we've shown that we can do even better. Last year, our client Carrefour helped us present our cybersecurity project with them to panels of judges made up of IT managers and CISOs.

Is The CIA Triad Relevant? Confidentiality, Integrity & Availability Today

These days, security is more important to companies than sales. When your company must maximize renewals, you’re not selling your product once — you’re selling it day in, day out. The moment your security breaches or your services go down, guarantee your customers and users are considering your competitor. Strong cybersecurity helps safeguard your data and your networks from theft, fraud and unauthorized access.

Predictions 2023: Data Investments Will Pay Off for the Public Sector

Here at Splunk we’ve been looking ahead to 2023 through our annual predictions for the public sector. This report is once again published alongside our leadership insights and emerging trends, IT and observability, and security editions. The new year presents many challenges that will affect the public and private sectors alike, including economic volatility, intensifying cyberattacks, the tech talent shortage and more.

2023 Security Trends for APAC and the Evolving Role of CISOs

The focus on resilience is changing the role of security leaders in organizations today and will continue to do so in 2023. 2022 saw a lot of disruption in businesses, especially with rising cybercrime incidents. Cyber threats will only continue to grow and multiply due to the ongoing convergence of data, changing the discipline of cybersecurity altogether.

CISA Top Malware Summary

This blog summarizes the Splunk Threat Research Team’s (STRT) recent review of the CISA Top 10 Malware strains for the year 2021 report. While many of these payloads have been covered in our past and present research (available at research.splunk.com), these malware families are still active in the wild. Notably, five malware families we analyzed in this article can still be seen in the ANY.RUN Malware Trends Tracker.

How To Do AppSec: The Application Security Guide

Modern applications are sophisticated, with different third-party software and hardware components and complicated integrations compared to legacy applications. With these complications, there is an increase in exploitable vulnerabilities in the application layer. Thus, application security is one of the most critical aspects organizations should focus on to secure their applications from cyberattacks.

Cloud Native Security: The 4C Approach, The 3Rs & Strategies for Cloud Native Security

Many organizations today develop, build and deploy cloud native applications that utilize infrastructure and services offered by cloud computing providers like AWS, Azure or Google Cloud Platform (GCP). This trend highlights a critical consideration for organizations — how to secure applications, infrastructures and data in cloud-native systems.

Splunk Named a Leader in The Forrester Wave: Security Analytics Platforms, Q4 2022

We’re thrilled to share that Splunk has been named a Leader in The Forrester Wave™: Security Analytics Platforms, Q4 2022. We are committed to developing world-class solutions for the SOC, so it's a true honor to be named a Leader by Forrester. We are proud to help organizations accelerate threat detection and investigations, achieve cybersecurity resilience, and navigate their most critical security challenges.

CTI: The Cyber Threat Intelligence Guide

Cyber threats continue to evolve, with cyberattacks happening in the world every 39 seconds. That’s why cybersecurity has become one of the topmost concerns in many organizations. Despite many intelligent defense mechanisms organizations leverage, emerging cyber threats continue to disrupt businesses in many ways. Cyber Threat Intelligence is the best way for organizations to mitigate the risks of new cyber threats in the future. In this article, I’ll explain…

Zoom. Enhance!: Finding Value in Macro-level ATT&CK Reporting

With cyberattacks growing in scale and complexity, it has never been more difficult to figure out where to invest your time and defensive resources. This remains the core challenge of optimizing an effective security organization. A good prioritization approach should be data-driven, and informed by real attacker activity.