Managed Cyber Security Services Benefits: A Rapid-Fire View
As a cybersecurity leader, you know that security is the foundation of your business’s success. Not only are you responsible for proactively monitoring and responding to threats, but also ensuring compliance with up-to-date regulations. But who has the time? It can be an overwhelming task to stay on top of ... Read More
Splunk SOAR Cyber Security: A Comprehensive Overview
Are the myriad of cyber security threats overwhelming your Splunk Security SOC team? Are you looking for a way to automate your response processes and streamlining your cyber security operations? Consider investigating SOAR – Security Orchestration Automation and Response. One of the most popular cyber security solutions currently available on ... Read More
Understanding Splunk ES and Its Role in Cybersecurity
With the ever-evolving threat environment, it’s more important than ever to understand how Splunk cyber security capabilities can help protect enterprise data. Having a deep understanding of how Splunk ES (Enterprise Security) can monitor and protect data will not only boost security confidence but also increase productivity within an organization. ... Read More
The Ultimate Guide to Building Effective Security Use Cases
It’s no secret: cybersecurity isn’t a one size fits all world. Every organization has different needs and complexities, which means that the usefulness of the security use cases you develop will vary depending on what your business does. And now you’re probably wondering, “How do I find out which security ... Read More
Expert Q&A: Unlock A Splunk MSSP Perspective on Today’s Cybersecurity World
With the increasing pressure from complex cybersecurity threats, many security leaders are turning to specialized expertise–such as a managed security services provider (MSSP or Splunk MSSP)–for help. In this Q&A, Matt Yonchak, a Splunk and security expert who has been working in the field for more than 15 years, shares ... Read More
9 Benefits of Using a Managed Security Services Provider
Cybersecurity leaders are under constant pressure to protect their companies from cyber threats with organizational threat awareness continuing to be a key concern. According to research, More than 50% of CISOs feel that their organizations aren't prepared for an attack. In addition, managing an entire program internally can take up ... Read More
The Ultimate Guide to Building Effective Security Use Cases
It’s no secret: cybersecurity isn’t a one size fits all world. Every organization has different needs and complexities, which means that the usefulness of security use cases will vary depending on what your business does! And now you're probably wondering, "How do I find out which security use cases are ... Read More
Global Collegiate Penetration Testing Competition Industry Resource List
Splunk enthusiasts, cybersecurity professionals, penetration testers, and students–this blog post is for you! Penetration testing is a critical component of cybersecurity and essential for protecting businesses and organizations of all sizes. However, penetration testing can be expensive and time-consuming, making it difficult for students and other newcomers to the field ... Read More
Phishing, Scam, & Marketing Emails: What’s the Difference?
When it comes to email communications today, phishing and spam are both unwelcome nuisances in everyone's inbox. In order to defend against the different tactics cybercriminals are leveraging online, a variety of essential security measures are necessary–one of the most important being general awareness. Even though the words “phishing” and ... Read More
Solving Garbage with Radare2
Flare-on is a great CTF-style event. Its popularity means you can find many write ups for the same challenge, so you can pick and choose new techniques and tools to learn. I have seen a couple of challenge write-ups, but here I will solve this challenge using Radare2 by virtualizing ... Read More