With organizations today focusing their security efforts on ransomware detection, phishing prevention, and command and control monitoring, many tend to overlook one of the simplest, non-human security weaknesses: Unpatched systems. While exploits to vulnerabilities on unpatched systems don’t cause as many breaches as phishing or social engineering do, they still cause nearly 10% (Verizon Breach […]
As today’s threat landscape continues to grow more complex, managing your organization’s security posture is no easy task. Setting up a powerful data platform like Splunk Cloud or Splunk Enterprise is a great step in the right direction. But is it enough? Not necessarily. For leaders who want to truly make the most out of […]
With 75% of databases expected to be on a cloud platform by the end of 2022, the topic of on-prem vs. cloud is more relevant now than ever. The advantages of cloud computing are many — namely, reduced costs, improved security, increased business agility, stronger backup and disaster recovery, and freed up time. In this […]
I’ll get the deep-nerd stuff out of the way up front: synthetic monitoring has a special place in my heart because it was my way into this whole observability/SRE/IT ops/monitoring space. *Adjusts glasses* My synthetic monitoring journey began as a Network Operations Center (NOC) engineer in the Managed Services department at a software company. When […]
Thinking of joining the SP6 team? Here are four reasons why SP6 is a great place to work. 1. We’re Committed to Our Employees Competitive salaries, benefits, and development opportunities At SP6, you’re more than just a number. We’re invested in the wellbeing of our employees, which is why we offer competitive salaries, benefits, and […]
Choosing a Cybersecurity Professional Services (PS) provider is similar to choosing any other professional provider. Think about how you would go about choosing a doctor, lawyer, or mechanic. Would you look at reviews? Seek out referrals? Conduct brief phone interviews? The process for choosing a PS provider is largely the same. In this article, we’ll […]
As a Splunk Professional Services consultant I have the good fortune of working with really smart and experienced engineers, and the combination of smart and experienced means they’re trying to be as ready as they can for what comes next. In this blog, we’ll discuss how to prepare for a Splunk migration.
A law passed by Congress late last year allocated $1 billion in cybersecurity grants for state and local governments to improve their digital defenses.
Editor’s Note: Jim Barge is a co-founder of SP6. When you make a big investment in a solution for your company, you want it to deliver results. But when it comes to Splunk, some organizations fail to use this powerful software, including its data analytics, to its full potential. I’ve seen it with our own […]
We’ve said it before: The Department of Defense Cybersecurity Maturity Model Certification (CMMC) Program is extremely complex. Contractors working within the Department of Defense supply chain must create detailed processes to show they can satisfy the DoD’s tightened data security requirements. As a first step, contractors should focus on successfully auditing their practices and meeting […]