Syndicated Blog

Hurricane Labs
IT Security Professionals

Splunk Tutorial: KV Store Troubleshooting Adventures

| | Infosec Blog
Introduction One of my least favorite features in Splunk is KV Store - mainly, because whenever I have to deal with it as a Splunk administrator, it’s broken in some horrible new ...

SPL Tricks: Dealing with Nested Name-Value Pairs in JSON

| | Infosec Blog, Splunk
JSON is a fantastic logging format and Splunk has built in support for it. However, when dealing with JSON logs, there’s a certain field structure that can be a little tricky to ...
NECCDC 2023: Red Team Adventures

NECCDC 2023: Red Team Adventures

As cybersecurity enthusiasts, we don't miss any chance to participate in events that challenge our skills and support up-and-coming security professionals in the process. That's why it was a thrill to represent ...

Managed Cyber Security Services Benefits: A Rapid-Fire View

| | Infosec Blog, security
As a cybersecurity leader, you know that security is the foundation of your business’s success. Not only are you responsible for proactively monitoring and responding to threats, but also ensuring compliance with ...

Splunk SOAR Cyber Security: A Comprehensive Overview

| | Infosec Blog, SOAR
Are the myriad of cyber security threats overwhelming your Splunk Security SOC team? Are you looking for a way to automate your response processes and streamlining your cyber security operations? Consider investigating ...

Understanding Splunk ES and Its Role in Cybersecurity

| | Infosec Blog, SIEM
With the ever-evolving threat environment, it’s more important than ever to understand how Splunk cyber security capabilities can help protect enterprise data. Having a deep understanding of how Splunk ES (Enterprise Security) ...

The Ultimate Guide to Building Effective Security Use Cases

| | Infosec Blog, SIEM
It’s no secret: cybersecurity isn’t a one size fits all world. Every organization has different needs and complexities, which means that the usefulness of the security use cases you develop will vary ...

7 Cybersecurity Tips to Protect Your Business

| | Infosec Blog, security
As companies rely more and more on technology to do business, it becomes increasingly important for employers of all sizes to be aware of the security risks. Ensuring company data, devices, and ...
Employee Security – 7 Best Practices to Consider

Employee Security – 7 Best Practices to Consider

| | Infosec Blog, security
In the first installment of our cybersecurity best practices, we explored how individuals can safeguard their personal data. But just as vital to security is employee security awareness and protecting important information ...

7 Ways To Improve Your Personal Security Right Now

| | Infosec Blog, security
Does waking up each morning to an earful about the latest cyber disasters leave you worried about your personal security? With all ransomware attacks, identity theft scams, and countries hacking one another, ...