Our no-fluff guide breaks down everything C-level executives need to know about ransomware threats, prevention, and mitigation.
Ransomware attacks on state, local, and education (SLED) organizations have increased in recent years, and they show no signs of slowing down. Just a few weeks ago, the City of Oakland was hit by a ransomware attack that forced the city into a state of emergency as officials scrambled to respond. And they aren’t alone […]
Summary indexing is a process that allows you to search large datasets more efficiently by creating smaller, customized summaries of those datasets to search instead. Because these new summary indexes have significantly fewer events for your Splunk software to search through, searches run against them complete much faster. In this article, we’ll breakdown everything you […]
Using Simple XML source code to build dashboards in Splunk doesn’t have to be complicated. Here are five of the best tips and tricks for improved dashboarding. Jump to section: 1. Fixing the Base Search Gotcha Base searches reduce the number of large searches on a dashboard by running a single search and then having […]
Does an investment in data innovation drive real, monetary results? That was the question driving Splunk’s latest research endeavor, The Economic Impact of Data Innovation 2023. By surveying over 2,000 organizations worldwide, researchers discovered that mature data practices allow organizations to increase profits by nearly 10%, get a leg up on competition, and drive significant […]
Passwords. We all have to use them, and like underwear, we have to change them, too. So, what makes a good password? And what makes a good change cycle? Here are six things to keep in mind: Length matters. Strong passwords have a minimum of eight or nine characters. Like a cake, you have to […]
Phishing is one of today’s largest cybersecurity threats. With 90% of data breaches tracing back to a phishing email, it’s crucial that members of your organization don’t fall victim. In this article, we’ll provide a comprehensive guide on how you can stay safe from phishing attacks. We’ll break down what exactly phishing is, how it […]
It’s Monday morning. You sit at the computer, enter your login credentials, slam the ‘Enter’ button, and sigh when your phone goes off in, what always seems to be, any room but the one you’re in. Yes, the ritualistic hunt for your phone has its purpose. Let’s talk about multi-factor authentication, or MFA. Put simply, […]