Splunk Development Services
Security Operations Center (SoC)
Security Information and Event Mgmt. (SIEM)
Security Orchestration, Automation, and Response (SOAR)
Site Reliability Engineering (SRE)
IT Services Management (ITSM)
Artificial Intelligence for ITOps (AIOps)
Splunk Managed Services
Splunk Professional Services
Splunk Ninja as a Service
Splunk Python 3 Migration
Splunk Enterprise Security (ES)
Splunk Phantom SOAR
Events & Webinars
Get In Touch
Our experiences define our identity
Remediate Security Vulnerabilities in npm/Yarn dependencies
Category: Security Vulnerabilities, Vulnera...
Software vulnerabilities are typically the root cause of many computer system security failures. During a software development lifecycle, there are three stages to address such ...
Web Accessibility: Designing an Accessible Color Palette
Category: Web Accessibility
The State of Web Accessibility in 2020 This is the second blog post about accessibility. If you missed the first post, Sein Tun does a great write up on the different acceptance...
Best of Both Worlds – Deep SIEM Insights with Powerful Business Intelligence Dashboards: Google Chronicle + Looker
Category: Business Intelligence, Google Chr...
Introduction to SIEM Security information and event management (SIEM) solutions collect a range of security and other data from security controls and devices throughout the IT e...
Unify your SOC with Splunk Mission Control Plugins
Category: Splunk, Splunk Mission Control
Introduction to Splunk Mission Control Splunk Mission Control attempts to reinvent security operations, it’s a unified security operations platform that brings together security...
An introduction on using SonarQube
Category: Quality and Security, SonarQube
An Introduction on SonarQube SonarQube is a Code Quality Assurance tool that collects and analyzes source code, and provides reports for the code quality of your project. It com...
How to use Nexus OSS User Access Management
Category: Nexus OSS, Uncategorized
What is Nexus OSS Nexus OSS is a free artifact repository with universal format support. It provides a single source of truth for all your components, binaries, and build artifa...
Introduction: DevOps & Site Reliability Engineering
Category: DevOps, Site Reliability Engineering
Development and Operations Throughout the 80’s, and 90’s Systems Administrators (or SysAdmins) wrote code to create, improve, and manage the computing systems under their ...
How to get your data from various services to MS Teams Channel
Category: MS Teams
MS Teams allows users to create a webhook that allows users to post data into the channel. The user can expose any HTTPS endpoint and design your own connectors. Microsoft has m...
Vulnerability detection using VulnDB integration with Nmap
Category: Vulnerability Detection
Vulnerability management is the process of identifying, classifying, prioritizing, remediating, and mitigating software vulnerabilities. It is crucial to computer security and n...
Advanced Threat Hunting Harnessing Chronicle Backstory with Demisto
Category: Cyber Security
Simplifying Threat Hunting & Remediation by harnessing Chronicle Backstory capabilities with Demisto’s Intelligence orchestration. The cybersecurity landscape is chang...
Filter by Tags
Quality and Security
Site Reliability Engineering
Splunk Mission Control
Crest Data Systems. |
Ok, I agree