Splunk nabs on-call management startup VictorOps for $120 M

In a DevOps world, the operations part of the equation needs to be on call to deal with issues as they come up 24/7. We used to use pagers. Today’s solutions like PagerDuty and VictorOps have been created to place this kind of requirement in a modern digital context. Today, Splunk bought VictorOps for $120 […] Continue reading Splunk nabs on-call management startup VictorOps for $120 M

Splunk turns data processing chops to Industrial IoT

Splunk has always been known as a company that can sift through oodles of log or security data and help customers surface the important bits. Today, it announced it was going to try to apply that same skill set to Industrial Internet of Things data. IIoT is data found in manufacturing settings, typically come from […] Continue reading Splunk turns data processing chops to Industrial IoT

[SANS ISC] Extending Hunting Capabilities in Your Network

I published the following diary on isc.sans.org: “Extending Hunting Capabilities in Your Network“: Today’s diary is an extension to the one I posted yesterday about hunting for malicious files crossing your network. Searching for new IOCs is nice but there are risks of missing important pieces of information! Indeed, the first

[The post [SANS ISC] Extending Hunting Capabilities in Your Network has been first published on /dev/random]

Continue reading [SANS ISC] Extending Hunting Capabilities in Your Network

[SANS ISC] Automatic Hunting for Malicious Files Crossing your Network

I published the following diary on isc.sans.org: “Automatic Hunting for Malicious Files Crossing your Network“: If classic security controls remain mandatory (antivirus, IDS, etc), it is always useful to increase your capacity to detect suspicious activities occurring in your networks. Here is a quick recipe that I’m using to detect

[The post [SANS ISC] Automatic Hunting for Malicious Files Crossing your Network has been first published on /dev/random]

Continue reading [SANS ISC] Automatic Hunting for Malicious Files Crossing your Network

Splunk to Dive Deeper into Cybersecurity with Phantom Buy

For a long time now Splunk has been content to essentially offer up cybersecurity advice made possible by applying analytics to machine data captured within the logs of various systems. That information then would be used to identify anomalies indicati… Continue reading Splunk to Dive Deeper into Cybersecurity with Phantom Buy

PhishMe, Splunk, & CyberX – Business Security Weekly #76

In the news, PhishMe acquired for $400M, Splunk acquires Phantom Cybersecurity for $350M, CyberX raised $18M Series B, and more on this episode of Business Security Weekly! Full Show NotesVisit http://securityweekly.com/category/ssw for all the latest … Continue reading PhishMe, Splunk, & CyberX – Business Security Weekly #76

Red Hat, OpenShift, Atos, and Trustwave – Enterprise Security Weekly #81

In the news, Atos unveils new managed service built on Red Hat OpenShift platform, Trustwave launches proactive Threat Hunting service, Phantom Cyber fetches $350 million in acquisition by Splunk, and more on this episode of Enterprise Security Weekly!… Continue reading Red Hat, OpenShift, Atos, and Trustwave – Enterprise Security Weekly #81

Red Hat, OpenShift, Atos, and Trustwave – Enterprise Security Weekly #81

In the news, Atos unveils new managed service built on Red Hat OpenShift platform, Trustwave launches proactive Threat Hunting service, Phantom Cyber fetches $350 million in acquisition by Splunk, and more on this episode of Enterprise Security Weekly!… Continue reading Red Hat, OpenShift, Atos, and Trustwave – Enterprise Security Weekly #81