Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Logging

How Devo Helps Our Customers Solve Pressing Cybersecurity Challenges

For the past 10-plus years, cybersecurity solutions have been innovating rapidly to thwart new threats. But as they solved security challenges, new ones constantly emerged — especially as organizations continue to expedite their digital transformation efforts and shift to the cloud.

What Is SIEM?

Technology companies love abbreviations and acronyms. Starting with what’s probably the original tech company, International Business Machines (better known as IBM), initials, abbreviations and acronyms continue to dominate the personal computer (PC), telecommunications (telco), security operations (SecOps), and many other tech industries.

Minnesota Judicial Courts See $1M ROI with Splunk

Security analysts know this situation well: inundated by alerts, alternating between 10 different security tools, and feeling the pressure of responding to each and every threat. It’s typically around this point that SOC teams realize it’s humanly impossible to process the amount of data that needs to be processed, and they should start looking for a solution. Gretchen White, Chief Information Security Officer at Minnesota Judicial Courts, experienced this firsthand.

Security Hygiene - Why Is It Important?

“What happened?” If you’ve never uttered those words, this blog isn’t for you. For those of us in cybersecurity, this pint-sized phrase triggers memories of unforeseen security incidents and long email threads with the CISO. What happened to those security patches? Why didn’t we prevent that intrusion? Organizations tend to lean towards protecting their borders and less towards understanding the importance of overall security hygiene.

Top Three Reasons You Should Use an Endpoint Agent

To better understand your security posture, your security team needs visibility into your environment and infrastructure. But to achieve more granular visibility, they also need an effective and efficient way to collect data from company endpoints. Deploying an agent provides your security team with an efficient way to collect endpoint data in a scalable manner.

Federal Effort to Improve Cybersecurity Prioritizes Log Management

In May, President Biden issued an executive order designed to improve cybersecurity in the federal government and, by extension, the nation. Recently, details have started to come out about what this much-needed effort will involve. The latest development is a memorandum from the Office of Management and Budget that focuses on data log collection and analysis.

Securing Your Cloud Future

Today, cloud and digital transformations have changed our environments dramatically and the old way of doing security just isn’t cutting it. It’s time for a new approach. Join us to hear from our VP of Security Products, Jane Wong and Head of Intelligence Platform, Patrick Coughlin how you can build an analytics-fueled, automation-driven and cloud-delivered security operation with Splunk Security Cloud.