What is Splunk?
Unlocking the potential of data has become a mission-critical task for businesses striving to stay relevant in the age of tech. Businesses generate a truly unprecedented amount of data. Every click, log entry, move of the cursor, system alert, etc. generates data. This data holds a ton of potential for ... Read More
Strengthening Cybersecurity to Enhance Compliance: The Splunk and CrowdStrike Advantage
In today's digital age, businesses constantly face unprecedented cybersecurity challenges. The ever-evolving threat landscape, stringent regulatory requirements, and the growing volume of sensitive data make safeguarding your organization’s data a top priority. Fortunately, you can leverage advanced cybersecurity solutions to protect assets and customer data. Understanding the Challenges Industries with ... Read More
Fortifying Cybersecurity in the Finance Industry with Managed Detection & Response
Financial institutions are entrusted with a vast treasure trove of sensitive data. In this digital age, protecting this data and maintaining customer trust is paramount. Managed Detection & Response (MDR) emerges as a powerful ally for mid-sized financial businesses seeking to bolster their cybersecurity posture. The Essence of MDR At ... Read More
Cloud Security in Financial Services: Strategies for Safe Migration
In today's rapidly evolving digital landscape, the financial services industry is undergoing a profound transformation. The shift to cloud computing has become a cornerstone of this transformation, offering unparalleled scalability, flexibility, and cost-efficiency. However, with this newfound agility comes cybersecurity challenges that cannot be ignored. As you embark on the ... Read More
The Benefits of Penetration Testing and Purple Teaming for Financial Security Assessments
In an era of persistent cyber threats, financial institutions must take every possible step to protect their assets and customer data. Penetration testing and purple teaming are vital components of a comprehensive security strategy. Understanding Penetration Testing Penetration testing, often referred to as "pen testing," is a simulated cyberattack on ... Read More
Unlocking the Power of ‘Raptor’: CrowdStrike’s Game-Changing Update
At Hurricane Labs, we're committed to keeping you informed about the latest developments in cybersecurity, and today, we're thrilled to share some exciting news from CrowdStrike. The security landscape is evolving rapidly, and CrowdStrike continues to lead the way as the modern security platform of choice for the XDR era ... Read More
Data Resilience, Insights, Action! Recapping Splunk .conf 2023
.conf23 has wrapped up, and what an incredible journey it's been! For the first time, Hurricane Labs proudly sponsored the event, interacting with customers, partners, and devoted blog enthusiasts. Our main focus? Diving deep into the digital resilience theme, Splunk’s continuous dedication to broadening its horizons beyond mere security to ... Read More
Splunk Tutorial: KV Store Troubleshooting Adventures
Introduction One of my least favorite features in Splunk is KV Store - mainly, because whenever I have to deal with it as a Splunk administrator, it’s broken in some horrible new way that I need to figure out. The goal of this post is to capture one of these ... Read More
SPL Tricks: Dealing with Nested Name-Value Pairs in JSON
JSON is a fantastic logging format and Splunk has built in support for it. However, when dealing with JSON logs, there’s a certain field structure that can be a little tricky to manage: The issue here is that Splunk will extract these fields as `name=foo` and `value=bar` by default. I’ve ... Read More