Splunk

splunk

Threat Intel and Splunk Enterprise Security Part 1 - What’s The Point of Threat Intel in ES?

You're undoubtedly aware of this based on your question, but there's a ridiculous volume of data that falls into the threat intelligence bucket these days. The challenge becomes figuring out what's of value to you and your organization, and then cultivating and maintaining a threat intelligence store to serve your needs.

splunk

Let’s Talk About Text, Baby

Machine data is a private language all to itself and a tough nut to crack; luckily Splunk has made it accessible for almost everyone. Human or natural language has its own problems, however. It’s like a junk drawer filled with random objects (and some sort of sticky substance that’s best not to think about). Which is to say, natural language is especially difficult for machines to deal with on the best of days.

splunk

Game of Thrones: A Tale of Fire(walls) and ICE (Infiltrating Cyber Espionage)

I first wrote about how cybersecurity is similar to Game Of Thrones a couple of years ago, but the worlds of Westeros or the SOC don’t stay the same for long. If you’re avid watchers of GOT, or the trends in security - you’ll know that the map has changed, the threat landscape has shifted, and the wall has been breached.

splunk

Splunk Your Phantom Events

Splunk and Phantom… What a powerful combination! With Splunk Enterprise Security (ES), you get the power of the platform to interrogate your data, detect security threats, and investigate suspicious activities; with Splunk Phantom, you gain the ability to leverage a wide range of security orchestration, automation, and response (SOAR) capabilities to further investigate and take action on the notable events that have been detected.

splunk

Cloud Services Have Broken Your Defenses – Here's How to Fix Them

Gather ‘round, children, and hear tell of the old days when an enterprise network was a carefully assembled combination of hardware and software living inside a datacenter owned by an individual company. A shining firewall stood guard at the perimeter, its portals manned by the noble knights, Intrusion Detection, Network Antivirus, and Content Inspection. This heroic coterie kept everything inside safe from the anarchy that reigned outside the magical walls.

splunk

23 AI Strategies for Making Your Life in IT Suck Less - Part 2

In case you missed Part 1 of our "23 AI Strategies for Making Your Life in IT Suck Less" blog series, you can check it out here. Ready for the second half of the list? Continue on for the rest of our 23 tips, tactics and strategies for how you could bring artificial intelligence (AI) into your organization.

splunk

All Eyes on Splunk: A Recap of RSA Conference 2019

It’s hard to believe that RSA Conference 2019 was just earlier this month; it came and went with so much energy and activity. As the largest global security event of the year, Splunkers were among over 50,000 attendees who came to San Francisco to connect and share all the latest in cyberthreats and solutions—including Alexa and myself.

splunk

Is Your Security Practice Aligned With Business Outcomes ?

Security is now a top priority for businesses worldwide. One of the highlights of my work at Splunk is when I host Splunk’s CISO Customer Advisory Board meetings with security leaders representing Fortune 500 and mid-sized enterprises from all industries. These strategic meetings focus on top of mind issues for CISOs and key market trends.