Discover how an automation-first approach to security operations helps teams stay ahead of sophisticated adversaries and adapt to evolving techniques and threats.
moreIn our latest release of Splunk Enterprise Security, we have revolutionized the SOC workflow experience, enabling security analysts to seamlessly detect what matters, investigate holistically, and respond rapidly.
moreWatch an insightful webinar where we delve into the innovative approaches to solving fraud using the Splunk suite of products. This session is designed for security experts and IT leaders from financial services organizations or any other industry that are looking to enhance their fraud detection and prevention strategies.
moreSee what Splunk SOAR is delivering in version 6.3. During this session, the team provides a deep dive into new features like end-user prompts, FedRAMP certification, and integrations with Splunk Enterprise Security to help empower your SOC.
moreContinuous Asset Discovery and Proactive Risk Management with Splunk Asset and Risk Intelligence
moreJoin this Tech Talk to learn from Dan Christiansen, Staff Security Strategist, about how you can build upon the visibility and security monitoring you’ve already established to enhance your security analytics and investigation capabilities and detect and respond to threats faster.
moreWatch now to see an overview of the latest security content the team has developed to defend against RCEs, best practices for implementing and using this content and a walkthrough of the detection engineering process the Splunk Threat Research Team follows to create security content for defending against CVEs.
moreThis tech talk shares how the Splunk Threat Hunting team seamlessly integrated the PEAK Threat Hunting Framework into their workflow while leveraging Splunk.
morePhishing and malware attacks continue to surge, and phishing campaigns grow increasingly complex – all of which leaves analysts buried under a daily avalanche of alerts.
moreDid you know the Splunk Threat Research Team regularly releases new, pre-packaged security content? Just in the last few months, the team has released dozens of new and updated detections and analytics stories covering the latest threats, including malware campaigns, zero-day vulnerabilities, CVEs, and more.
moreJoin members of the Splunk Machine Learning for Security (SMLS) team, Abhinav Mishra and Kumar Sharad, for a comprehensive overview of techniques including Large Language Models (LLMs), Generative Adversarial Networks (GANs), Diffusion Models, and Autoencoders.
moreWatch Splunk Applications and Systems Engineer, Daniel Federschmidt as he shares the latest on the Visual Studio Code Extension for Splunk SOAR and see how you can make developing apps a breeze.
moreThe Splunk SOAR team shares more on the latest and greatest updates in version 6.2.
moreTune in to see new capabilities that deliver an improved workflow experience for simplified investigations; enhanced visibility and reduced manual workload; and customized investigation workflows for faster decision-making as well as the latest security content updates to protect you from the latest threats.
moreAmazon recently announced the General Availability of Security Lake (ASL), a new data lake offering in AWS to store and query security data from both AWS and non-AWS data sources.
moreSince the release of Splunk SOAR 6.0, the Splunk SOAR team has been hard at work implementing new features and integrations to help improve the SOAR user experience.
moreThis tech talk highlights content developed by the Splunk Threat Research Team in the past quarter, delivered in the form of detections that are grouped into analytic stories and delivered to Splunk customers through the Enterprise Security Content Update (ESCU) app.
moreThreat research shows that a large percentage of organizations experience DNS attacks. Often, adversaries dynamically generate domain names using Domain Generation Algorithms (DGA) to create C2 infrastructure not prone to static analysis disruption.
moreStruggling with alert fatigue, lack of context, and prioritization around security incidents?
moreHow do you utilize the Splunk Cloud Migration Application?
more