SPL Tricks: Dealing with Nested Name-Value Pairs in JSON

| | Infosec Blog, Splunk
JSON is a fantastic logging format and Splunk has built in support for it. However, when dealing with JSON logs, there’s a certain field structure that can be a little tricky to ...
DTEX and Splunk - A Powerful Push Integration

DTEX integrations for Insider Risk Management: Splunk and CrowdStrike

Integrations are critical for efficient and effective insider risk management. This might sound like a simple statement, but there is a lot that goes into it. No cybersecurity tool today can operate ...
MITRE Splunk DLL sideloading ransomware Iran cybersecurity attack Security

Splunk: Cybersecurity Dynamics Rapidly Changing

A survey of 1,520 cybersecurity and IT leaders published today found more than half (52%) reporting their organization suffered a data breach in the past two years, with 62% experiencing monthly unplanned ...
Security Boulevard
MITRE Splunk DLL sideloading ransomware Iran cybersecurity attack Security

Splunk: Cybercriminals Use These Types of TTPs

A report published by Splunk that analyzed three years of data showed a marked increase in the number of cyberattacks that employ four specific types of techniques. Based on analysis of data ...
Security Boulevard

Expert Q&A: Unlock A Splunk MSSP Perspective on Today’s Cybersecurity World

With the increasing pressure from complex cybersecurity threats, many security leaders are turning to specialized expertise–such as a managed security services provider (MSSP or Splunk MSSP)–for help.  In this Q&A, Matt Yonchak, ...

9 Benefits of Using a Managed Security Services Provider

Cybersecurity leaders are under constant pressure to protect their companies from cyber threats with organizational threat awareness continuing to be a key concern. According to research, More than 50% of CISOs feel ...

7 Ways Imperva Solutions Reduce the Cost of Data Security

As we push into Q4, economic uncertainty caused by rising interest rates, as-yet unchecked inflation, and a bear market is driving many enterprises to buck the trend and tighten cyber security budgets ...

For Cost-Conscious Compliance Reporting, Rethink Your Data Retention Capability

Staffing costs required to generate reports for compliance audits are high, but the time required to generate the reports themselves is not necessarily to blame if you have suitable access to your ...
Calculate Splunk Ingestion Costs Savings when Pre-Processing Data Repository Logs with Imperva DSF

Calculate Splunk Ingestion Costs Savings when Pre-Processing Data Repository Logs with Imperva DSF

If you use Splunk to ingest all your data for security analytics, you likely recognize it as one of the greatest indexing tools ever created. With Splunk, your security teams get a ...

How Imperva Data Security Fabric Reduces Splunk Ingestion Costs and Accelerates Incident Management

They say the devil is in the details. This is especially true for security professionals that use Splunk as their organization’s primary security analytics engine. Splunk analytics gives security teams a real-time ...