Discover the pros and cons of Splunk’s different pricing models, and learn how to choose the one that’s right for you.
Discover the differences between Ransomware Assessments by SP6 and penetration testing, and learn which is right for your organization.
Our no-fluff guide breaks down everything C-level executives need to know about ransomware threats, prevention, and mitigation.
Ransomware attacks on state, local, and education (SLED) organizations have increased in recent years, and they show no signs of slowing down. Just a few weeks ago, the City of Oakland was hit by a ransomware attack that forced the city into a state of emergency as officials scrambled to respond. And they aren’t alone […]
Discover how to better manage your indexes, get more out of apps and add-ons, avoid low disk space, and more. Here’s what we wished we knew sooner about Splunk.
Summary indexing is a process that allows you to search large datasets more efficiently by creating smaller, customized summaries of those datasets to search instead. Because these new summary indexes have significantly fewer events for your Splunk software to search through, searches run against them complete much faster. In this article, we’ll breakdown everything you […]
Using Simple XML source code to build dashboards in Splunk doesn’t have to be complicated. Here are five of the best tips and tricks for improved dashboarding. Jump to section: 1. Fixing the Base Search Gotcha Base searches reduce the number of large searches on a dashboard by running a single search and then having […]
Does an investment in data innovation drive real, monetary results? That was the question driving Splunk’s latest research endeavor, The Economic Impact of Data Innovation 2023. By surveying over 2,000 organizations worldwide, researchers discovered that mature data practices allow organizations to increase profits by nearly 10%, get a leg up on competition, and drive significant […]
Passwords. We all have to use them, and like underwear, we have to change them, too. So, what makes a good password? And what makes a good change cycle? Here are six things to keep in mind: Length matters. Strong passwords have a minimum of eight or nine characters. Like a cake, you have to […]
Phishing is one of today’s largest cybersecurity threats. With 90% of data breaches tracing back to a phishing email, it’s crucial that members of your organization don’t fall victim. In this article, we’ll provide a comprehensive guide on how you can stay safe from phishing attacks. We’ll break down what exactly phishing is, how it […]