Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Logging

The 3 Rs of Enterprise Security: Rotate, Repave, Repair

Modern enterprises are fraught with dangers and vulnerabilities that were rare even a decade ago. Cyber threats are becoming more frequent and sophisticated, and even the most secure organizations are falling victim to their attacks. In this landscape, a proactive security stance is crucial. That is where the 3Rs of enterprise security — Rotate, Repave, and Repair — offer your organization a critical advantage.

Coffee Talk with SURGe: the Interview Series featuring Eva Galperin

Join Audra Streetman and special guest Eva Galperin, director of cybersecurity at the Electronic Frontier Foundation, for an interview about data privacy, stalkerware, artificial intelligence, and the recent rise in deepfake sextortion schemes. You can follow Eva on Twitter (aka X) @evacide and learn more about her work at EFF.org.

Amadey Threat Analysis and Detections

The Amadey Trojan Stealer, an active and prominent malware, first emerged on the cybersecurity landscape in 2018 and has maintained a persistent botnet infrastructure ever since. Several campaigns have used this malware, like the previous Splunk Threat Research blog related to RedLine loader, the multi-stage attack distribution article from McAfee in May 2023 and the campaign where it uses N-day vulnerabilities to deliver Amadey malware noted in March 2023 by DarkTrace.

Eliminate Manual Threat Analysis of Credential Phishing and Malware Threats With Splunk Attack Analyzer

We are extremely excited to introduce a new addition to the Splunk unified security operations experience: Splunk Attack Analyzer (formerly Twinwave), which automates threat analysis of suspected malware and credential phishing threats by identifying and extracting associated forensics to provide accurate and timely detections. SOC analysts continue to struggle to work across many security tools to help them understand and address threats targeting the organization.

Greater Detection Accuracy and Faster Time-to-Value with Splunk IT Service Intelligence 4.17

We’re all juggling more complexity than ever before. Chances are you’re being pulled in multiple directions, working across teams and dealing with more tools than you’d like to. We know you want to keep everything running smoothly and don’t want to focus your time on setting things up, especially when you’re probably dealing with other fires.

Monitoring Networks with Snort IDS-IPS

Networks are the data highways upon which you build your digital transformation infrastructure. Like interstate highways transmit goods, networks transmit data. Every connected user and device is a network digital on-ramp. When malicious actors gain unauthorized access to networks, organizations must detect and contain them as quickly as possible, requiring security analysts to embark on a digital high-speed chase.

From Resurface to Graylog API Security: The Next Chapter

When I started Resurface, my core thesis was that web and API security brought unique requirements requiring purpose-built data systems. Using Splunk at scale for API monitoring was/is prohibitively expensive. Using Hadoop or Kafka requires a nerd army to run at any scale. Few data platforms include a mature web or API monitoring model, so this has to be custom-overlaid at significant expense.

Understanding Amazon Security Lake: Enhancing Data Security in the Cloud

This year, Amazon Web Services (AWS), a leading cloud services provider, announced a comprehensive security solution called Amazon Security Lake. In this blog post, we will explore what Amazon Security Lake is, how it works, the benefits for organizations, and partners you can leverage alongside it to enhance security analytics and quickly respond to security events. Image source: Amazon.