Blogs

Our experiences define our identity
17 Mar
Vulnerability-detection
Vulnerability detection using VulnDB integration with Nmap
Category: Vulnerability Detection
Vulnerability management is the process of identifying, classifying, prioritizing, remediating, and mitigating software vulnerabilities. It is crucial to computer security and n...
26 Feb
Advanced Threat Hunting harnessing Chronicle Backstory with Demisto
Advanced Threat Hunting Harnessing Chronicle Backstory with Demisto
Category: Cyber Security
Simplifying Threat Hunting & Remediation by harnessing Chronicle Backstory capabilities with Demisto’s Intelligence orchestration. The cybersecurity landscape is chang...
11 Feb
Splunk Search - Introduction to SPL
An introduction to the Splunk Search Processing Language
Category: Splunk, Splunk SPL
Overview Splunk offers an expansive processing language that enables a user to be able to reduce and transform large amounts of data from a dataset, into specific and relevant p...
20 Dec
web accessibility blog banner
Web Accessibility: How to Enable Access for Everyone
Category: Web Accessibility, Web Development
Accessibility is seldom discussed in today’s web development and design. The web is fundamentally designed to work for all people, regardless of their hardware, software, ...
10 Dec
Debugging Splunk App using Python
Debugging Splunk App/Add-on Using Python Debugger
Category: Python, Splunk
Overview While developing Splunk apps and add-ons, we rely heavily on Python for various third-party integrations. Even though tested, Sometimes we run into issues when the code...
01 Oct
Splunk Data Migration Blog Image
Splunk Data Migration – Migrating from Single Instance to Indexer Cluster
Category: Splunk
A single instance deployment is often a good approach for testing and POCs. It might even work for smaller environments as it handles all aspects of Splunk including indexing an...
20 Jun
AWS GuardDuty with Splunk Blog Image 1110x630
How to Onboard AWS GuardDuty Data into Splunk
Category: Splunk, Splunk Cloud
Recently one of our customers asked us to onboard data AWS GuardDuty threat intelligence data into Splunk. Since the process was not trivial, we decided to publish this for ever...
  • 1
  • 2

By using this site, you agree with our use of cookies. Privacy Policy