Splunk
5 Ways Contrast Security ADR Closes the Cybersecurity Gap for Applications and APIs | Contrast Security
Gazing into your security operations center (SOC) platform, what do you see? ...
Demystifying Okta Attacks with Dorothy and Splunk
https://github.com/elastic/dorothyOverviewOkta is a leading identity and access management (IAM) platform designed to help organizations securely manage and streamline user authentication and authorization. It provides a comprehensive suite of services, including single sign-on ...
Cisco Extends Cybersecurity Portfolio with Help from AI
Cisco plans to embed AI capabilities into its Firewall Threat Defense (FTD) software and Cisco Security Cloud ...
Unlock SaaS Security Intelligence with Splunk and Obsidian
In a world of evolving SaaS security threats, organizations require advanced threat detection and response capabilities. Obsidian’s integration with Splunk provides just that–empowering security teams to effectively address SaaS security threats. Splunk ...
Is Cisco’s Acquisition of Splunk a Shade of Brilliance or Madness?
Is Cisco’s Acquisition of Splunk a Shade of Brilliance or Madness?3 min read·Just now--Acquiring companies in the tech space is more about defining the future and less about solving the current threats ...
Cisco’s Acquisition of Splunk: What Does It Mean for Splunk SOAR Users?
In a headline-grabbing announcement that’s got the cybersecurity industry talking, Cisco has revealed its intention to acquire Splunk for an astonishing $28 billion. That’s right, the tech giant is making moves to ...
Why Smart SOAR is the Best Independent SOAR for Splunk Enterprise Security
Connecting Splunk SIEM with other security tools is a scenario Smart SOAR handles often. By ingesting alerts from Splunk into Smart SOAR, and using the integration commands in event and incident playbooks, ...
Boss of the SOC: Capture-the-Flag as a Recruitment Tool
Splunk's Boss of the SOC (BOTS) exercise helps cybersecurity pros show off skills and also serves as a valuable recruiting tool ...
SPL Tricks: Dealing with Nested Name-Value Pairs in JSON
JSON is a fantastic logging format and Splunk has built in support for it. However, when dealing with JSON logs, there’s a certain field structure that can be a little tricky to ...
DTEX integrations for Insider Risk Management: Splunk and CrowdStrike
Integrations are critical for efficient and effective insider risk management. This might sound like a simple statement, but there is a lot that goes into it. No cybersecurity tool today can operate ...