San Francisco, CA, USA
Jan 22, 2020   |  By Drew Church
Editor’s note: CVE-2020-0601, unsurprisingly, has created a great deal of interest and concern. There is so much going on that we could not adequately provide a full accounting in a single blog post! This post focuses on detection of the vulnerability based on network logs, specifically Zeek as well as Endpoint. If you are collecting vulnerability scan data and need to keep an eye on your inventory of systems that are at risk, then check out Anthony Perez’s blog.
Jan 21, 2020   |  By Anthony Tellez
The Deep Learning Toolkit (DLTK) was launched at .conf19 with the intention of helping customers leverage additional Deep Learning frameworks as part of their machine learning workflows. The app ships with four separate containers: Tensorflow 2.0 - CPU, Tensorflow 2.0 GPU, Pytorch and SpaCy. All of the containers provide a base install of Jupyter Lab & Tensorboard to help customers develop and create neural nets or custom algorithms.
Jan 21, 2020   |  By Shalabh Goyal
Workload management is a powerful Splunk Enterprise feature that allows you to assign system resources to Splunk workloads based on business priorities. In this blog, I will describe four best practices for using workload management. If you want to refresh your knowledge about this feature or use cases that it solves, please read through our recent series of workload management blogs — part 1, part 2, and part 3.
Jan 21, 2020   |  By Nick Tankersley
In this blog post, we discuss using Telegraf as your core metrics collection platform with the Splunk App for Infrastructure (SAI) version 2.0, the latest version of Splunk’s infrastructure monitoring app that was recently announced at Splunk .conf19. This blog post assumes you already have some familiarity with Telegraf and Splunk. We provided steps and examples to make sense of everything along the way, and there are also links to resources for more advanced workflows and considerations.
Jan 20, 2020   |  By Matthias Maier
Software vulnerabilities are part of our lives in a digitalized world. If anything is certain, it’s that we will continue to see vulnerabilities in software code! Recently the CVE-2020-0601 vulnerability, also known as CurveBall or “Windows CryptoAPI Spoofing Vulnerability”, was discovered, reported by the NSA and made headlines. The NSA even shared a Cybersecurity Advisory on the topic. Anthony previously talked about it from a public sector and Vulnerability Scanner angle.
Nov 16, 2018   |  By Splunk
Gaining insights from your data requires more than collecting and analyzing metrics and logs. With the acceleration of customer and business demands, site reliability engineers and IT Ops analysts now require operational visibility into their entire architecture, something that traditional APM tools, dev logging tools, and SRE tools aren’t equipped to provide. Observability enables you to inspect and understand your IT stack; but what is it, and how does it differ from IT monitoring?
Oct 21, 2018   |  By Splunk
Imagine a world where incident alerts arrive 30 minutes before problems even begin — you’d actually have the power to prevent outages and deliver a truly seamless experience to your customers. Sound impossible? Think again — the right AIOps (Artificial Intelligence for IT Operations) solution can help you maintain uptime, reduce manual incident-management tasks and increase productivity.
Oct 21, 2018   |  By Splunk
The hype around artificial intelligence (AI) and machine learning (ML) has exploded, sometimes overshadowing the real uses and innovations happening everyday at organizations across the globe. The reality is that applying AI and ML to data-dependent challenges presents opportunity for better security, faster innovation and overall improved efficiency.
Oct 1, 2018   |  By Splunk
Most IT organizations have adopted event management as a central practice to help find and fix what’s broken, but today's tools focus on managing the volume of events—they do not deliver service context. Without context, you are ill-equipped to focus on the right problem at the right time. What you need is something different—something that makes IT events less eventful and more insightful—and now, you can finally do it!
Oct 1, 2018   |  By Splunk
At Splunk, we make it easy for our customers to turn mountains of machine data in their Amazon Web Services (AWS) and hybrid environments into valuable business, operational and security insights that improve their businesses.
Dec 5, 2019   |  By Splunk
Learn How Splunk's fast, flexible, and intuitive process mining solution, Splunk Business Flow, can help you discover and investigate any business process to drive continuous improvement in your business.
Dec 3, 2019   |  By Splunk
Kevin has the “alert fatigue”. He’s overwhelmed by too many security alerts, and he doesn’t have the resources or the time to investigate and respond to all of them. Jeff explains how automation from Splunk Phantom can help. And now, with Phantom on Splunk Mobile, you can automate security operations directly from your mobile phone.
Nov 7, 2019   |  By Splunk
Splunk Data Fabric Search allows you perform analysis at massive scale across any number of Splunk deployments and eventually any 3rd party data store. Listen to a brief overview of the product from one of our very own Splunkers.
Oct 30, 2019   |  By Splunk
Where do performance and sustainability intersect? In the Porsche Taycan. Learn how the legendary carmaker is using the Data-to-Everything Platform to deliver a world-class experience to drivers everywhere.
Oct 30, 2019   |  By Splunk
Jeff and Kevin meet up for “SOCtails” to chat about their experiences working in different SOCs (Security Operations Center). Kevin gets a security alert and opens his laptop to resolve it. Jeff shows Kevin a better way with Splunk Phantom.