If you’re responsible for creating, maintaining or scaling your Splunk implementation, don’t miss this webinar on the refreshed and revisedSplunk Success Framework(SSF).
This tech talk highlights how Splunk combined security and machine learning (ML) expertise to implement new detections in the Enterprise Security Content Update (ESCU) app.
This tech talk highlights content developed by the Splunk Threat Research Team in the past quarter, delivered in the form of detections that are grouped into analytic stories and delivered to Splunk customers through the Enterprise Security Content Update (ESCU) app.
Threat researchshows that a large percentage of organizations experience DNS attacks. Often, adversaries dynamically generate domain names using Domain Generation Algorithms (DGA) to create C2 infrastructure not prone to static analysis disruption.
How do you utilize the Splunk Cloud Migration Application? Our webinar will discuss these questions and provide some lessons learned from our Splunk Cloud Platform migration.
How to use the analytical power of Splunk to hunt for cyber and insider threats, and also utilizes the Splunk Machine Learning Toolkit (MLKT) for novelty and outlier detection from the noisy security datasets.
Tune in for Maximize the value from Microsoft Defender with Splunk to see how to prepare the data in Microsoft Defender and collect and normalize it into the Vulnerability data model.