Splunk Tech Talks
Deep-dives for technical practitioners.

Splunk Attack Range: Build, Simulate, Detect

Rumsha
Splunk Employee
Splunk Employee

Screen Shot 2022-10-13 at 12.41.35 PM.png

 

WATCH NOW 

 

Can your security teams successfully perform attack simulations to visualize and record attacks? 

Splunk Attack Range 2.0 allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk. Watch the Tech Talk,  Splunk Attack Range: Build, Simulate, Detect  and join the Splunk Threat Research  Team for a demo of Splunk Attack Range v2.0 and to learn about:

  • How the Splunk Threat Research Team leverages the Splunk Attack Range
  • The newest features available in the Splunk Attack Range v2.0
  • Future plans for Splunk Attack Range v3.0

 

Also don’t forget to view all the resources available to continue your Splunk journey:

Blogs

 

Resources

 

Recommended .conf22 Sessions

  • Home on the Range: Detection Engineering with Splunk Attack Range
  • Linux Threat Detection with Attack Range
  • Purple Teaming - Build, Attack, and Defend Your Organization

Sign in and access sessions

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Shape the Future of Splunk: Join the Product Research Lab!

Join the Splunk Product Research Lab and connect with us in the Slack channel #product-research-lab to get ...

Auto-Injector for Everything Else: Making OpenTelemetry Truly Universal

You might have seen Splunk’s recent announcement about donating the OpenTelemetry Injector to the ...