Splunk Tutorial: How To Bulk Enable Splunk Searches
In the Splunk GUI, you can select and enable multiple searches. However, what if you want to enable only a set of searches that match specific conditions?. There’s no built-in way to do this yet, but...
View ArticleUnlocking the Power of ‘Raptor’: CrowdStrike’s Game-Changing Update
At Hurricane Labs, we’re committed to keeping you informed about the latest developments in cybersecurity, and today, we’re thrilled to share some exciting news from CrowdStrike. The security landscape...
View ArticleThe Benefits of Penetration Testing and Purple Teaming for Financial Security...
In an era of persistent cyber threats, financial institutions must take every possible step to protect their assets and customer data. Penetration testing and purple teaming are vital components of a...
View ArticleCloud Security in Financial Services: Strategies for Safe Migration
In today’s rapidly evolving digital landscape, the financial services industry is undergoing a profound transformation. The shift to cloud computing has become a cornerstone of this transformation,...
View ArticleFortifying Cybersecurity in the Finance Industry with Managed Detection &...
Financial institutions are entrusted with a vast treasure trove of sensitive data. In this digital age, protecting this data and maintaining customer trust is paramount. Managed Detection &...
View ArticleHighlights from Information Security Summit in Cleveland
A few members of the Hurricane Labs team spent the last week of October at the Cleveland Information Security Summit conference at the IX-Center in Berea, Ohio. Key members of our team were available...
View ArticleUsing Admin’s Little Helper in Splunk Cloud
Introduction If you’re a Splunk admin, there’s an excellent chance you’ve used the btool command to troubleshoot your configuration. This command is the best way to understand configuration precedence...
View ArticleStrengthening Cybersecurity to Enhance Compliance: The Splunk and CrowdStrike...
In today’s digital age, businesses constantly face unprecedented cybersecurity challenges. The ever-evolving threat landscape, stringent regulatory requirements, and the growing volume of sensitive...
View ArticleOh No! My JSON Keys and Values are Separated! How Can I Extract Them For My...
Splunk parses pure JSON logs almost like magic. The format works really well for Splunk to automatically extract fields you would need in your searches. However, an issue arises when a JSON log...
View ArticleEnable Sharing of Datamodel Acceleration Summaries between Search Heads
Introduction If you’re running Splunk Enterprise Security Suite, you are already leveraging accelerated datamodels to power your detections and altering. However, there may be situations where you want...
View Article
More Pages to Explore .....