Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Logging

Falcon LogScale Live Dashboards: Demo Drill Down

Monitoring security events in real-time empowers you to find stealthy threats and spot attack trends early. See how Falcon LogScale’s live dashboards provide a flexible, intuitive way to visualize your security data. You'll learn how to build a MITRE ATT&CK dashboard that automatically updates with live data.

Intrusion Prevention Systems (IPS) Explained

An Intrusion Prevention System (IPS) is a technology that can automatically detect and control security attacks, both known and unknown. The focus of this system is threat prevention — though a related technology, IDS, works to better detect threats. Let’s take look at how IPS prevents intrusions and the most common ways IPS can work.

How to Install and Configure Infosec Multicloud

The Infosec App for Splunk is your starter security pack. It's designed to address the most common security use cases, including continuous monitoring and security investigations. The new Infosec Multicloud App for Splunk is designed by our field team to help customers that have a cloud environment. In addition to views of security posture across cloud providers, the app includes a billing dashboard for a high level overview of costs spread across your various cloud providers.

Splunk Wins Awards for SIEM, SOAR and More

Splunk is proud to announce we’ve been granted four 2023 PeerSpot Tech Leader Awards! This honor is extended to just the top three solutions in four categories on the PeerSpot Buying Intelligence Platform. We’re particularly thrilled to be recognized by real users of Splunk Enterprise Security and Splunk SOAR that can speak to their features, functionality, and the business value they drive for their organizations.

Regulatory Compliance 101: What You Need To Know

To operate legally and ethically, every company, no matter the size or type of organization, must be aware of the laws, regulations, and industry standards that govern them. Though many businesses may view regulatory compliance as a burden, it does not have to be this way. The benefits of following these rules greatly outweigh the consequences. Organizations can ensure the safety and well-being of their employees, customers, and the general public by following these regulations.

Today's Top Cybersecurity Threats & the Impacts to Your Business

With the escalating frequency and complexity of cyberattacks, businesses are constantly under threat. Security operations have become an indispensable aspect of organizational survival and success. Cyberattacks and data breaches regularly make headlines as malicious actors continue to adapt and develop new tactics.

Tips for Building a SOC Analyst Home Lab

Do you aspire to become a standout in the SOC world? To excel, you must consistently cultivate both your technical hard skills and non-technical soft skills. No specific career path is the golden ticket; each individual’s journey to SOC stardom is a blend of conventional education and hands-on training, seasoned with vital real-world experience. A purpose-built SOC analyst home lab is one proven self-guided learning tool to sharpen your technical know-how.

SIEM vs. SOAR in 2024: What's The Difference?

The threat landscape today is complex and constantly changing. Organizations require robust cybersecurity solutions to protect their networks and systems. SIEM and SOAR are two technologies that are pivotal in strengthening security operations. In this article, I’ll look at both technologies, SIEM and SOAR, to help you understand the importance of strengthening your organization’s SecOps.

Coffee Talk with SURGe: 2023-OCT-03 WS_FTP RCE, Exim Scope, ChatGPT, Cybersecurity Awareness Month

Grab a cup of coffee and join Mick Baccio, Ryan Kovar and Audra Streetman for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: Mick and Ryan competed in a 60 second charity challenge to share the pros and cons of Cybersecurity Awareness Month.