Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SOAR on Azure Now Available

The market-leading momentum of our partnership and ongoing engineering roadmap with Microsoft continues! Splunk Security Orchestration, Automation and Response (SOAR) is now available as a native SaaS solution on Azure, enabling customers to even further improve their security posture and create greater digital resilience. Splunk SOAR on Azure acts as the efficiency engine for SOC analysts by connecting Azure services and third-party tools, automating workflows and tasks, and speeding response times.

Proxy Servers: How Proxies Work, Common Types, Uses & More

Are you worried about your privacy online? You're not alone. In one U.S. survey, three out of every four respondents expressed growing concerns about their data privacy. In the past five years, the vast majority of businesses and organizations have been victim to cyberattacks, and the average cost of data breaches has increased by $137,000.

Strategies for accelerating a successful log migration

Log management becomes more challenging as both log volume and diversity rapidly grow. Yet many companies still rely on legacy log management and SIEM solutions that aren’t designed to cost-effectively or securely handle the large scale of logs today coming from sources both in the cloud and on premises.

Splunk Security Ops: Building the Blueprint for Success

Let’s be real—running Security Operations is like trying to drink from a firehose while juggling chainsaws blindfolded at the same time. The threats don’t take weekends, the alerts never stop, and just when you think you’ve seen it all, some new attacker decides to get creative. And let’s not forget we are simultaneously managing the needs of the business and managing a global team seated all over the world.

Sequenced Event Templates via Risk-based Alerting

Sequenced event templates are pretty cool, but they were developed around the time that Risk-based Alerting (RBA) was developed in Splunk Enterprise Security. Additionally, they don’t have all the great context we can generate with the holistic picture provided by risk, so I want to provide guidance on how we would implement its equivalent in the RBA context as they are now deprecated in Splunk Enterprise Security 8.0. There are two approaches we can utilize that do slightly different things.

Adversary Tradecraft: Apache Tomcat RCE

CVE-2025-24813 is a critical vulnerability (CVSS base score of 9.8) affecting Apache Tomcat, a widely used open-source web server and servlet container. This issue affects Apache Tomcat: In this blog, we’ll simulate an attack and look at the activity within Graylog. Throughout the analysis, and at the conclusion of the post, we’ll provide practical threat-hunting and detection strategies you can implement in your own environments.

SOAR: Transforming Security and IT

When people hear “SOAR,” they often think of Security, Orchestration, Automation and Response, a powerful solution for streamlining security operations. But SOAR’s capabilities don’t stop there. By driving efficiency and automation in IT operations, infrastructure management and cloud optimization, SOAR empowers teams across the organization to work smarter and respond faster.