Blog
the dangers of your unpatched systems

The Dangers of Your Unpatched Systems

With organizations today focusing their security efforts on ransomware detection, phishing prevention, and command and control monitoring, many tend to overlook one of the simplest, non-human security weaknesses: Unpatched systems. While exploits to vulnerabilities on unpatched systems don’t cause as many breaches as phishing or social engineering do, they still cause nearly 10% (Verizon Breach […]

Blog
3 must have splunk premium apps

Simplifying Security: 3 Must-Have Splunk Premium Apps

As today’s threat landscape continues to grow more complex, managing your organization’s security posture is no easy task.  Setting up a powerful data platform like Splunk Cloud or Splunk Enterprise is a great step in the right direction. But is it enough?  Not necessarily.   For leaders who want to truly make the most out of […]

Blog
why sp6 is a great place to work

Why SP6 is a Great Place to Work

Thinking of joining the SP6 team? Here are four reasons why SP6 is a great place to work. 1. We’re Committed to Our Employees Competitive salaries, benefits, and development opportunities At SP6, you’re more than just a number. We’re invested in the wellbeing of our employees, which is why we offer competitive salaries, benefits, and […]

Blog
top 5 in code

5 Key Qualities of a Top Splunk Admin

As a Splunk Professional Services consultant I have the good fortune of working with really smart and experienced engineers, and the combination of smart and experienced means they’re trying to be as ready as they can for what comes next. In this blog, we’ll discuss how to prepare for a Splunk migration.

Blog
We introduced the SP6 CMMC Guardian App powered by Splunk to help defense contractors with CMMC compliance.

Introducing the SP6 CMMC Guardian App for Evidence Collecting & Automation 

We’ve said it before: The Department of Defense Cybersecurity Maturity Model Certification (CMMC) Program is extremely complex. Contractors working within the Department of Defense supply chain must create detailed processes to show they can satisfy the DoD’s tightened data security requirements.  As a first step, contractors should focus on successfully auditing their practices and meeting […]