Managed Cyber Security Services Benefits: A Rapid-Fire View

| | Infosec Blog, security
As a cybersecurity leader, you know that security is the foundation of your business’s success. Not only are you responsible for proactively monitoring and responding to threats, but also ensuring compliance with up-to-date regulations.  But who has the time? It can be an overwhelming task to stay on top of ... Read More

Splunk SOAR Cyber Security: A Comprehensive Overview

| | Infosec Blog, SOAR
Are the myriad of cyber security threats overwhelming your Splunk Security SOC team? Are you looking for a way to automate your response processes and streamlining your cyber security operations? Consider investigating SOAR – Security Orchestration Automation and Response. One of the most popular cyber security solutions currently available on ... Read More

Understanding Splunk ES and Its Role in Cybersecurity

| | Infosec Blog, SIEM
With the ever-evolving threat environment, it’s more important than ever to understand how Splunk cyber security capabilities can help protect enterprise data. Having a deep understanding of how Splunk ES (Enterprise Security) can monitor and protect data will not only boost security confidence but also increase productivity within an organization.  ... Read More

The Ultimate Guide to Building Effective Security Use Cases

| | Infosec Blog, SIEM
It’s no secret: cybersecurity isn’t a one size fits all world. Every organization has different needs and complexities, which means that the usefulness of the security use cases you develop will vary depending on what your business does. And now you’re probably wondering, “How do I find out which security ... Read More

Expert Q&A: Unlock A Splunk MSSP Perspective on Today’s Cybersecurity World

With the increasing pressure from complex cybersecurity threats, many security leaders are turning to specialized expertise–such as a managed security services provider (MSSP or Splunk MSSP)–for help.  In this Q&A, Matt Yonchak, a Splunk and security expert who has been working in the field for more than 15 years, shares ... Read More

9 Benefits of Using a Managed Security Services Provider

Cybersecurity leaders are under constant pressure to protect their companies from cyber threats with organizational threat awareness continuing to be a key concern. According to research, More than 50% of CISOs feel that their organizations aren't prepared for an attack. In addition, managing an entire program internally can take up ... Read More

The Ultimate Guide to Building Effective Security Use Cases

| | Infosec Blog, security
It’s no secret: cybersecurity isn’t a one size fits all world. Every organization has different needs and complexities, which means that the usefulness of security use cases will vary depending on what your business does! And now you're probably wondering, "How do I find out which security use cases are ... Read More

Global Collegiate Penetration Testing Competition Industry Resource List

Splunk enthusiasts, cybersecurity professionals, penetration testers, and students–this blog post is for you!  Penetration testing is a critical component of cybersecurity and essential for protecting businesses and organizations of all sizes. However, penetration testing can be expensive and time-consuming, making it difficult for students and other newcomers to the field ... Read More
Phishing, Scam, & Marketing Emails: What’s the Difference?

Phishing, Scam, & Marketing Emails: What’s the Difference?

| | Infosec Blog, security
When it comes to email communications today, phishing and spam are both unwelcome nuisances in everyone's inbox. In order to defend against the different tactics cybercriminals are leveraging online, a variety of essential security measures are necessary–one of the most important being general awareness.  Even though the words “phishing” and ... Read More

Solving Garbage with Radare2

Flare-on is a great CTF-style event. Its popularity means you can find many write ups for the same challenge, so you can pick and choose new techniques and tools to learn. I have seen a couple of challenge write-ups, but here I will solve this challenge using Radare2 by virtualizing ... Read More