Blog Cybersecurity Splunk Administration
what is summary indexing

What is Summary Indexing?

Summary indexing is a process that allows you to search large datasets more efficiently by creating smaller, customized summaries of those datasets to search instead.   Because these new summary indexes have significantly fewer events for your Splunk software to search through, searches run against them complete much faster.  In this article, we’ll breakdown everything you […]

Blog CMMC
We introduced the SP6 CMMC Guardian App powered by Splunk to help defense contractors with CMMC compliance.

Introducing the SP6 CMMC Guardian App for Evidence Collecting & Automation 

We’ve said it before: The Department of Defense Cybersecurity Maturity Model Certification (CMMC) Program is extremely complex. Contractors working within the Department of Defense supply chain must create detailed processes to show they can satisfy the DoD’s tightened data security requirements.  As a first step, contractors should focus on successfully auditing their practices and meeting […]

Blog Cybersecurity IT Observability

Here’s How to Get a Handle on Noise and Alert Fatigue

Editor’s Note: This article is co-authored by Barry Duncan, Team Lead, Professional Services Observability; and Chase Yates, Practice Manager, Security. A common problem technology teams face is the high volume of noise in their environments and the resulting alert fatigue.  Items clamoring for an analyst’s attention can include:  Threats  Anomalies  Incidents  Notable Events  According to […]

Blog CMMC
The evolution of CMMC is here - introducing CMMC 2.0

Welcome to the Evolution of Cybersecurity Maturity Model Certification – CMMC 2.0

Back in September, we wrote a blog about the Cybersecurity Maturity Model Certification (CMMC) program. In it, we explained how the Department of Defense introduced CMMC in 2019 to strengthen cybersecurity standards for Department of Defense (DoD) contractors.  CMMC builds a set of cybersecurity requirements into acquisition programs. It’s designed to help provide the DoD with confirmation that firms within the Defense Industrial Base (DIB) are meeting those requirements.   Why a Change from CMMC 1.0 to 2.0?  […]

Blog Cybersecurity Fraud Detection
Phantom employees don't work for your company but they collect paychecks.

Identifying and Preventing Payroll Fraud: Phantom Employees

SP6 “What You Need to Know” Series (Article 2 of 3)  No business is immune to payroll fraud. It costs U.S. companies millions of dollars each year.  Despite its prevalence, many organizations have no idea they’re victims of this type of theft. That’s because it can be extremely difficult to detect. Consider these facts: According to the 2020 Report to the Nations released by the Association of Certified Fraud Examiners (ACFE), organizations […]

Blog Cybersecurity Splunk Administration

Splunk Cloud Responsibilities: What Do I Manage and What Does Splunk Manage?

Are you considering Splunk’s cloud-based software-as-a-service (SaaS) solution? If so, you’re in good company. Splunk Cloud is an increasingly popular alternative to deploying Splunk on-premises, or in your own cloud environment. This is because Splunk Cloud: Removes the necessity of buying and managing the Splunk infrastructure. Eliminates a significant portion of the administrative overhead tied […]