Cybersecurity Blog & Resources
Arm yourself with the latest security insights and industry intelligence. Our write-ups have the essential knowledge to help you stay secure.
Cybersecurity Blog & Resources
Get the latest security updates and industry intelligence to help you stay secure.
Featured Cybersecurity Blog Posts
A Modern Approach to Generative Technology and Compliance
The digital world is transforming at an unprecedented pace. Generative AI introduces groundbreaking opportunities for innovation; alongside serious cybersecurity [...]
DeepSeek: The Chinese AI Startup That Shook the Tech World
The New Challenger in AI For years, the artificial intelligence world has been controlled by a few dominant players, [...]
Modern Security Testing – Leveling up the Crash Test Dummy
One thing not often thought of is the lowly crash test dummy. Traditionally, crash test dummies were modeled after [...]
Hurricane Labs Reflections on CPTC10 (Collegiate Penetration Testing Competition)
It’s one thing to help support an organization with a mission that you feel strongly about. But seeing something [...]
Phishing: A Persistent Threat in the Age of AI
Phishing is one of the most common and dangerous cyber threats facing organizations today. Despite growing awareness, employees often [...]
The Salt Typhoon Cyber Attack: A Wake Up Call?
The Salt Typhoon Cyber Attack: A Wake Up Call? In late 2024, a sophisticated cyber espionage operation rocked the [...]
Splunk SOAR – Sorting Containers to Improve SOAR On-Poll Functionality (Free Custom Function Provided)
Introduction: Splunk SOAR (Security, Orchestration, Automation, and Response) is a very useful tool that can super charge your security [...]
Improving Splunk Webhooks
Webhooks are an incredibly useful tool. Thanks to wide support across SaaS vendors, they provide a solid foundation for [...]
Strengthening Cybersecurity to Enhance Compliance: The Splunk and CrowdStrike Advantage
In today's digital age, businesses constantly face unprecedented cybersecurity challenges. The ever-evolving threat landscape, stringent regulatory requirements, and the [...]