Category: Things I Wish I’d Known about Splunk
Splunk Attack Range Setup Guide
Splunk Attack Range allows you to create vulnerable local or cloud environments, to simulate attacks and collect the data Into Splunk. In this on-demand video Bill Ouellette (Principal Splunk Security Engineer) will provide a Step by Step Guide on setting up the “Attack Range Framework” within your Splunk test instance. …
CIM, What… Why… How…
During your SIEM journey there will be many terms thrown your way, understanding those terms is absolutely essential when it comes to your security environment. In this article, we will bring clarity to one of the more important terms in SIEM, CIM (Common Information Model) Lets Start with the Basics! …
Splunk 2020 Predictions
In a this rapidly changing digitized world, data is at the root of everything, and essential to solving every problem. From basic business decisions to global crises, a panel of technology experts at Splunk has assembled more than a dozen predictions about how technology will transform business and daily life.…
AWS Lambda vs AWS Firehose
Splunk has multiple methods in regards to Getting Data In (GDI). One very popular method is the Http Event Collector (HEC). The use of the HEC allows data ingestion into Splunk via HTTP POST messages. Two popular methods that send POST messages out of AWS into Splunk are the AWS services: Lambda and Firehose.…