Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Critical Infrastructure Under Siege: Safeguarding Essential Services

Our world is more digitally connected than ever, including the critical infrastructure systems we rely on: power grids, water treatment plants, transportation networks, communication systems, emergency services, and hospitals. A successful attack on critical infrastructure can have dire consequences, ranging from widespread power outages and contaminated water supplies to economic downturns and societal disruption. Some of those consequences have come to fruition in recent years.

Splunk SOAR Has Attained FedRAMP Moderate Authorization

Splunk is proud to announce that Splunk SOAR has received Federal Risk and Authorization Management Program (FedRAMP) Agency Authorization at the Moderate impact level. Splunk SOAR is ready to help public sector teams work smarter by automating repetitive tasks, responding to security incidents in seconds, and increasing analyst productivity and accuracy to better protect their organizations and the missions they serve.

The Final Shell: Introducing ShellSweepX

Over the last year, we have continued to witness web shells breaching organizations worldwide, affecting both edge devices and on-premise web applications. Web shells consistently evade standard controls, posing a persistent threat. Today, the Splunk Threat Research Team is excited to announce the final tool in the ShellSweep collection: ShellSweepX.

How to Get Started with a Security Data Lake

Modern SecOps teams use Security Information and Event Management (SIEM) software to aggregate security logs, detect anomalies, hunt for threats, and enable rapid incident response. While SIEMs enable accurate, near real-time detection of threats, today's SIEM solutions were never designed to handle the volume of security data organizations generate daily. As daily log ingestion grows, so do the costs of data management.

The New & Improved Splunk Guide to Risk-Based Alerting

Howdy folks, it’s your friendly neighborhood transformational detection engineering evangelist Haylee Mills here. Maybe you’ve already been introduced to risk-based alerting, or maybe you’ve seen one of my many talks on the subject: Even if you haven’t, I’m super excited to share a brand new version of my step-by-step guide to success with the risk-based alerting framework!

Graylog API Security Content Pack: Changing the Game!

APIs form the backbone of modern digital systems, enabling seamless data exchange and integration. However, their critical role also makes them attractive targets for cyber threats. Traditional security measures often fail to address API-specific challenges effectively. Graylog API Security Content Pack emerges as a game-changer, reimagining API defense through innovative threat detection and response approaches.

Supply Chain Attacks: Infiltrating Organizations Through the Backdoor

An organization is only as secure as its weakest link — and the software supply chain is most often where the weakest link is found. A supply chain attack is a sophisticated cyberattack where malicious actors compromise a service provider to gain unauthorized access to its end users. Since 2018, the number of organizations impacted by supply chain attacks has increased by 2,600%.

Surviving to Thriving: Navigating SIEM Complexity

We've all heard the news; the SIEM market is changing like never before. With recent mergers and acquisitions, security professionals are finding themselves on shaky ground. It only gets more complex — teams are flooded with new tools, an avalanche of data, and a shortage of skilled professionals. It's no wonder that only 28% of security professionals believe their SOC is functioning effectively.

Strengthening Australia's Government Data and Digital Services with Splunk Digital Resilience

As the Splunk Industry Advisor to the Australian public sector, I work closely with government organisations and their leaders to understand their goals, objectives and the challenges they face in achieving digital resilience. This blog shares perspectives on how Splunk works with the Australian government to provide a unique approach to solve some of the public sector's toughest challenges.

6 Threat Detection Challenges for MDRs and How to Overcome Them

Managed Detection and Response (MDR) is a cybersecurity service offered by a Managed Security Services Provider (MSSP) that combines human security expertise with modern security tools to deliver managed threat detection, security monitoring, and incident response capabilities for both SMBs and enterprise clients.