Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cybersecurity Frameworks: What They Are & How to Use Them

With the easy availability of tools and knowledge, cyberattacks of all sorts are running rampant, putting pressure on organizations to better defend themselves. Security is a continuous process that grows over time — exactly why organizations need to create a strong foundation. Two important questions every organization has asked themselves are: Where do we start, and have we done enough?

The Rise of Student-Powered Security Operations Centers (SOCs)

In today's digital age, the prevalence of cyber attacks has become a major concern for organizations across various industries, with higher education institutions particularly vulnerable. As the volume and complexity of cyber threats continue to escalate, there is a growing need for innovative solutions to bolster cybersecurity defenses.

My CUPS Runneth Over (with CVEs)

The Common Unix Printing System (CUPS), a standard component in nearly every Unix-like and Linux system, has recently come under scrutiny due to a series of critical vulnerabilities discovered by security researcher Simone Margaritelli. These issues, collectively known as the CUPS vulnerability, expose Linux and Unix environments to potential remote code execution and information disclosure risks.

An Introduction to Threat Monitoring

According to CIS, just in the first half of 2024, malware-based threats rose by 30% from 2023. A similar 30% year-over-year increase was also found in cyber attacks in 2024 in a report by Check Point Research. With such alarming statistics, it is evident that the need for threat monitoring has become more critical than ever before. In this blog post, we'll explore what threat monitoring entails, why it's essential, and how you can implement best practices to safeguard your business.

A Case Study in Vulnerability Prioritization: Lessons Learned from Large-Scale Incidents

There’s no way around it: vulnerability management is complex. As organizations become more reliant on software and applications, the sheer volume of known vulnerabilities has become more difficult to track, prioritize, and remediate. Adversaries have also become increasingly reliant on exploiting vulnerabilities in order to compromise organizations.

Automatic Deprovisioning of users for Okta IdP

Splunk has implemented SCIM (System for Cross-domain Identity Management), a standardized protocol designed for efficient and secure management of user identities across various systems. With the release of this feature, Splunk customers can automatically deprovision users within Splunk when a user(s) are removed from the customer’s Okta Identity Provider (IdP) with following benefits for the customers.