Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing Attack Range v3.0

The Splunk Threat Research Team (STRT) is happy to release v3.0 of the Splunk Attack Range. Splunk Attack Range is an open source project that allows security teams to spin up a detection development environment to emulate adversary behavior and use the generated telemetry data to build detections in Splunk. This blog highlights the new features introduced in version 3.0 to help build resilient, high-quality detections.

The Power of Innovation in Business

Since the conception of mankind, our world has thrived on innovation. It solves problems and drives progress, moving our world forward generation after generation. Innovation has led to the development of new technologies, products, and services that solve problems and meet the needs of people in ways that were previously not possible. From the wheel and the printing press to electricity, cars, computers and the internet – it’s hard to imagine a world without these inventions.

Automating Instrument Data Ingestion and Access to Accelerate Lab Productivity

‍ In clinical research, the process of uploading and managing lab data is rife with obstacles. Some of those obstacles threaten to derail productivity, which delays deployment and drives up costs – time is money, after all, and the longer the research phase takes, the more organizations are forced to spend on staffing and other resources. Here’s an overview of the major obstacles biotech organizations are facing today.

3 Things You Can Do to Be More Secure Online

Over the last several decades, the world has become more and more digital. From banking online to interacting with friends on social media, the internet has radically altered how we interact with the world. While digital technology has empowered us in many ways, it has also brought some significant risks with it. Cyber-criminals have become savvier, putting your personal information and digital assets at risk.

6 Tips to Setup Foolproof AWS Security Groups

Adopting cloud technologies is one of the most common tech strategies followed by modern organizations. This may be due to various reasons depending on the nature of the business. But there are a few standard components that span across most domains, not least the fact that cloud vendors allow developers to easily create and take down resources on the cloud with minimal effort.

Software and AppSec Challenges and Opportunities in Banking and Fintech - Part One

The banking and fintech industries live and die on the reliability of the online services they offer. It’s vital that the sensitive data that the industry handles is robustly protected, and that the software and applications that it uses are secure. For effective software and application security, it’s critical that banking and fintech organizations rapidly detect, identify, and remediate software vulnerabilities.

How To Prevent DDoS Attacks in 2023

DDoS attacks are increasingly becoming common, especially for people who have their websites. This happens because DDoS attacks are harder to trace, and the perpetrators are hard to identify. As we advance into the IoT era, it's hard to deny that these attacks are becoming more frequent and powerful. This blog will cover DDoS attacks and how to prevent them.

What's exacerbating the cybersecurity skills gap and how to overcome it in 2023

As organizations grapple with new economic realities, security leaders face the familiar challenge of keeping their systems and data safe with limited resources. To continue to do more with, in many cases, even less is a tricky tightrope walk that requires creativity and strategy to ensure overall success. To make the most of whatever resources are available, it’s important for security teams to evaluate their unique needs and vulnerabilities carefully.

Weak vs Strong Passwords: How to Spot the Difference

The safety of your identity, data and online accounts relies heavily on the strength of your passwords, which is why you should be able to tell the difference between weak vs strong passwords. The importance of password security goes far beyond personal safety, as corporate breaches due to compromised credentials affect millions of people and cost billions of dollars each year. In fact, a recent report by Verizon reveals 81% of hacking-related data breaches are due to stolen or weak passwords.