This tutorial will walk you through how to successfully configure and ultimately set up LDAP authentication in Splunk....Read More
It’s important for both offensive and defensive security professionals to be aware of the attack vectors facing a Splunk deployment. This tutorial will show you some ways Splunk can be used as an offensive tool and the steps you can take to reduce the associated risks.Read More
The third part of the threat hunting series covers hands-on examples using basic process creation log queries to...Read More
This tutorial helps you know where to start finding anomalous activity through the examination of process creation logs...Read More
If you're looking for something different than the typical "one-size-fits-all" security mentality, you've come to the right place.