Splunk Attack Range Setup Guide

Splunk Attack Range allows you to create vulnerable local or cloud environments, to simulate attacks and collect the data Into Splunk. In this on-demand video Bill Ouellette (Principal Splunk Security Engineer) will provide a Step by Step Guide on setting up the “Attack Range Framework” within your Splunk test instance. …Learn MoreSplunk Attack Range Setup Guide

Hardening Your Splunk Environment

According to the Ponemon Institute the average cost of data breach for a company is $3.8 million dollars. Regardless of whether you are operating in the cloud or on-premise taking steps to harden your operating system is an absolute must to limit potential security weaknesses.…Learn MoreHardening Your Splunk Environment

CIM, What… Why… How…

During your SIEM journey there will be many terms thrown your way, understanding those terms is absolutely essential when it comes to your security environment. In this article, we will bring clarity to one of the more important terms in SIEM, CIM (Common Information Model) Lets Start with the Basics! …Learn MoreCIM, What… Why… How…

Splunk 2020 Predictions

In a this rapidly changing digitized world, data is at the root of everything, and essential to solving every problem. From basic business decisions to global crises, a panel of technology experts at Splunk has assembled more than a dozen predictions about how technology will transform business and daily life.…Learn MoreSplunk 2020 Predictions

Caught Red Handed…. Using Splunk to Catch Retail Theft Rings

According to The National Retail Federation, retail theft costs U.S. companies $30 Billion a year, with “professional/habitual shoplifters” responsible for 10% ($3b) of all retail theft. And the problem is only getting worse, with losses increasing at 7% year per year. How can you defend yourself against these losses?…Learn MoreCaught Red Handed…. Using Splunk to Catch Retail Theft Rings