Boss of the SOC Scoring Server, Questions and Answers, and Dataset!...
We have open-sourced the Boss of the SOC dataset (ver1.0) and BOT(S|N) scoring server. They can be used to run your own CTF, perform research, or train your internal users!
View ArticleDetect and Investigate Malicious Activity in Your AWS Environment with Splunk...
A new Enterprise Security Content Update Analytic Story helps you monitor for suspicious events that could indicate that an adversary has compromised your cloud.
View ArticleA First-Timer's RSA Conference Experience: Part 1
PUNCH Cyber Analytics' Lauren Deason shares her experience as a data scientist attending RSA Conference for the first time in part one of a two-part series
View ArticleA First-Timer's RSA Conference Experience: Part 2
PUNCH Cyber Analytics' Lauren Deason shares her experience as a data scientist attending RSA Conference for the first time in the conclusion of this two-part series
View ArticleClearer Insights and Investigations: Splunk Enterprise Security 5.1
Announcing the release of Splunk Enterprise Security 5.1, featuring a visual refresh compatible only with Splunk Enterprise 7.1
View ArticleWhat’s Won 9 Awards, Has 6 Female Leaders, and Is Also a Unicorn? Splunk...
Congratulations to each of the Splunk women recognized for their accomplishments in the 2018 CRN Women of the Channel Awards and CRN Power 100 list
View ArticleSplunkTrust Q&A with Yutaka Yamada
Get to know Yutaka Yamada, one of the newest SplunkTrust members and the founder of Japan’s first Splunk user group
View ArticleCustom Anomaly Detection with Splunk IT Service Intelligence and Machine...
Part 1 of a two-part series providing a detailed and technical walkthrough around customizing a custom Splunk ITSI Machine Learning workflow
View ArticleCustom Anomaly Detection with Splunk IT Service Intelligence and Machine...
Part 2 of a two-part series providing a detailed and technical walkthrough around customizing a custom Splunk ITSI Machine Learning workflow
View ArticleMetrics to the Max! Dramatic Performance Improvements for Monitoring and...
Discover the newest Metrics functionalities available with the Splunk Enterprise 7.1 release, including an enhanced metrics data store and "mstats" command
View ArticleWeathering the Event Storm: How AIOps and Splunk ITSI Event Analytics Can...
Learn more about the power of machine learning and Splunk IT Service Intelligence (ITSI) for event analytics
View ArticleBuild a Recipe for Success with Chef and Splunk
Splunker 'Chef Eger' offers a preview of the Splunk offerings available on the ChefConf 2018 menu from May 22-25 in Chicago
View ArticleIngest Netcool Alerts into Splunk ITSI Event Analytics
Describing the steps to ingest IBM Tivoli Netcool/OMNIbus alerts into IT Service Intelligence (ITSI) Notable Events Review.
View ArticleIngest AppDynamics and New Relic Alerts into Splunk ITSI Event Analytics
This post describes the steps to integrate AppDynamics and New Relic events and violations into ITSI Notable Events Review.
View ArticleIngest Nagios Alarms into Splunk ITSI Event Analytics
This post describes the steps to ingest Nagios Core alerts into ITSI Notable Events Review.
View ArticleSplunkLive! Zurich 2018: How Organisations in Switzerland Utilise Splunk as...
Highlights from SplunkLive! Zurich's customer stories
View ArticleThe Importance of Enforcing Multifactor Authentication in Your AWS Environment
A new detection search in Splunk Enterprise Security Content Update v 1.0.15 helps you monitor for users in your AWS environment for users not being authorized by multiple factors
View ArticleBoss of the SOC (BOTS) Investigation Workshop for Splunk
You've played BOTS with Splunk, now learn the how it all happened? This post discusses a new tutorial app that you can run on the BOTS v1 dataset to learn more about BOTS and have an educational...
View ArticleSplunk Giving Circle is Inspired to Make a Difference
Splunkers are working together to select and fund high-impact sustainable development projects
View ArticleStaff Picks for Splunk Security Reading: May 2018
A selection of presentations, white papers and blog posts you might have missed in May (or before), handpicked from the Splunk security world
View Article