Tag: Surge

Latest Articles

Threat Hunting with Splunk: Hands-on Tutorials for the Active Hunter
Security
4 Minute Read

Threat Hunting with Splunk: Hands-on Tutorials for the Active Hunter

Curious about threat hunting in Splunk? Wanna brush up on your baddie-finding skills? Here's the place to find every one of our expert articles for hunting with Splunk.
Detecting DNS Exfiltration with Splunk: Hunting Your DNS Dragons
Security
7 Minute Read

Detecting DNS Exfiltration with Splunk: Hunting Your DNS Dragons

DNS data is an all-too-common place for threats. Find out how to use Splunk to hunt for threats in your DNS. We will slay those DNS dragons.
Model-Assisted Threat Hunting (M-ATH) with the PEAK Framework
Security
9 Minute Read

Model-Assisted Threat Hunting (M-ATH) with the PEAK Framework

Welcome to the third entry in our introduction to the PEAK Threat Hunting Framework! Taking our detective theme to the next level, imagine a tough case where you need to call in a specialized investigator. For these unique cases, we can use algorithmically-driven approaches called Model-Assisted Threat Hunting (M-ATH).
Trust Unearned? Evaluating CA Trustworthiness Across 5 Billion Certificates
Security
10 Minute Read

Trust Unearned? Evaluating CA Trustworthiness Across 5 Billion Certificates

In this blog post, we dive into our recent research project, in which the Splunk SURGe team analyzed more than five billion TLS certificates to find out if the CAs we rely on are really worthy of our trust.
Splunk Field Hashing & Masking Capabilities for Compliance
Security
3 Minute Read

Splunk Field Hashing & Masking Capabilities for Compliance

Satisfy internal and external compliance requirements using Splunk standard components.
Hypothesis-Driven Hunting with the PEAK Framework
Security
9 Minute Read

Hypothesis-Driven Hunting with the PEAK Framework

Details on hypothesis-driven threat hunting with the PEAK framework.
Paws in the Pickle Jar: Risk & Vulnerability in the Model-sharing Ecosystem
Security
8 Minute Read

Paws in the Pickle Jar: Risk & Vulnerability in the Model-sharing Ecosystem

As AI / Machine Learning (ML) systems now support millions of daily users, has our understanding of the relevant security risks kept pace with this wild rate of adoption?
Introducing the PEAK Threat Hunting Framework
Security
4 Minute Read

Introducing the PEAK Threat Hunting Framework

Introducing the PEAK Threat Hunting Framework, bringing a fresh perspective to threat hunting and incorporating three distinct types of hunts.
Using Workflow Actions & OSINT for Threat Hunting in Splunk
Security
6 Minute Read

Using Workflow Actions & OSINT for Threat Hunting in Splunk

Two things will make you a more efficient & effective security analyst: OSINT and workflow actions in Splunk. We've got you covered in this article.
/en_us/blog/fragments/subscribe-footer