For this month’s edition of Playbook of the Month, we’ll look at how you can perform investigations at machine speed using Splunk SOAR and one of our investigation playbooks, Internal Host WinRM Investigate.
Let's look at how to use the popular Splunk Stream App for our favorite purpose: threat hunting! This is part of our Threat Hunting with Splunk series.
Splunk celebrates the launch of User Behavior Analytics (UBA) 5.3, introducing the 20 Node XL cluster, innovative Splunk UBA models, and essential system and security upgrades.
The 4.0.1 release of the App for Lookup File Editing helps users mitigate issues with new features such as a backup size limit and dashboards for tracking backup size.
Discover the power of Attribute-Based Access Control (ABAC) in managing security in different environments. Learn benefits, challenges, and implementation insights.
Explore the dark world of exploit kits — automated hacking tools available on the dark web. Learn how they exploit vulnerabilities, their dangers and possible defense strategies
Learn the ins and outs of performance testing — from types to metrics and tools. Ensure optimal software performance and user experience with this guide.
Discover the power of Attribute-Based Access Control (ABAC) in managing security in different environments. Learn benefits, challenges, and implementation insights.
The future of observability will continue to rapidly evolve and Splunk Partners play a crucial role in helping customers build resilience and grow their business with Splunk.
Discover the power of cloud analytics, from data consolidation to scalability and security. Learn how to choose the right platform for your business needs.
Along with the respective Splunk Enterprise version 9.1.0 and Splunk Cloud Version 9.0.2305 releases, Ingest Actions has launched a new set of features and capabilities that improve its usability and expand on configurability of data routed by Ingest Actions to S3.
The United States Securities and Exchange Commission’s (SEC) July 26 approval of new cybersecurity 'incident' disclosure rules is top of mind for every public company, and understanding what it means and how companies will be held accountable is crucial.
The Prescriptive Adoption Motions for Security and Observability offer technical expertise, best practices, and product knowledge to help you with key use cases.
Explore the evolving landscape of IoT cybersecurity. Learn why IoT security matters, benefits of IoT monitoring, and tools to safeguard your IoT ecosystem.
"Explore the power of event correlation in IT operations. Uncover hidden insights, detect issues, and enhance efficiency through meaningful event analysis. Learn more."