Unlock SaaS Security Intelligence with Splunk and Obsidian

In a world of evolving SaaS security threats, organizations require advanced threat detection and response capabilities. Obsidian’s integration with Splunk provides just that–empowering security teams to effectively address SaaS security threats. Splunk ...
Is Cisco’s Acquisition of Splunk a Shade of Brilliance or Madness?

Is Cisco’s Acquisition of Splunk a Shade of Brilliance or Madness?

Is Cisco’s Acquisition of Splunk a Shade of Brilliance or Madness?3 min read·Just now--Acquiring companies in the tech space is more about defining the future and less about solving the current threats ...
Automated Incident Response with Smart SOAR and Cisco Systems

Cisco’s Acquisition of Splunk: What Does It Mean for Splunk SOAR Users?

In a headline-grabbing announcement that’s got the cybersecurity industry talking, Cisco has revealed its intention to acquire Splunk for an astonishing $28 billion. That’s right, the tech giant is making moves to ...
Event Field mapping for Splunk Events in Smart SOAR

Why Smart SOAR is the Best Independent SOAR for Splunk Enterprise Security

Connecting Splunk SIEM with other security tools is a scenario Smart SOAR handles often. By ingesting alerts from Splunk into Smart SOAR, and using the integration commands in event and incident playbooks, ...
BOTS SOC Open Systems Palo Alto Kaspersky zScaler

Boss of the SOC: Capture-the-Flag as a Recruitment Tool

Splunk's Boss of the SOC (BOTS) exercise helps cybersecurity pros show off skills and also serves as a valuable recruiting tool ...
Security Boulevard

SPL Tricks: Dealing with Nested Name-Value Pairs in JSON

| | Infosec Blog, Splunk
JSON is a fantastic logging format and Splunk has built in support for it. However, when dealing with JSON logs, there’s a certain field structure that can be a little tricky to ...
DTEX and Splunk - A Powerful Push Integration

DTEX integrations for Insider Risk Management: Splunk and CrowdStrike

Integrations are critical for efficient and effective insider risk management. This might sound like a simple statement, but there is a lot that goes into it. No cybersecurity tool today can operate ...
AI, defense, cybersecurity,

Splunk: Cybersecurity Dynamics Rapidly Changing

A survey of 1,520 cybersecurity and IT leaders published today found more than half (52%) reporting their organization suffered a data breach in the past two years, with 62% experiencing monthly unplanned ...
Security Boulevard
AI, defense, cybersecurity,

Splunk: Cybercriminals Use These Types of TTPs

A report published by Splunk that analyzed three years of data showed a marked increase in the number of cyberattacks that employ four specific types of techniques. Based on analysis of data ...
Security Boulevard

Expert Q&A: Unlock A Splunk MSSP Perspective on Today’s Cybersecurity World

With the increasing pressure from complex cybersecurity threats, many security leaders are turning to specialized expertise–such as a managed security services provider (MSSP or Splunk MSSP)–for help.  In this Q&A, Matt Yonchak, ...