Back in September, we wrote a blog about the Cybersecurity Maturity Model Certification (CMMC) program. In it, we explained how the Department of Defense introduced CMMC in 2019 to strengthen cybersecurity standards for Department of Defense (DoD) contractors. CMMC builds a set of cybersecurity requirements into acquisition programs. It’s designed to help provide the DoD with confirmation that firms within the Defense Industrial Base (DIB) are meeting those requirements. Why a Change from CMMC 1.0 to 2.0? […]
SP6 “What You Need to Know” Series (Article 2 of 3) No business is immune to payroll fraud. It costs U.S. companies millions of dollars each year. Despite its prevalence, many organizations have no idea they’re victims of this type of theft. That’s because it can be extremely difficult to detect. Consider these facts: According to the 2020 Report to the Nations released by the Association of Certified Fraud Examiners (ACFE), organizations […]
Are you considering Splunk’s cloud-based software-as-a-service (SaaS) solution? If so, you’re in good company. Splunk Cloud is an increasingly popular alternative to deploying Splunk on-premises, or in your own cloud environment. This is because Splunk Cloud: Removes the necessity of buying and managing the Splunk infrastructure. Eliminates a significant portion of the administrative overhead tied […]
SP6 “What You Need to Know” Series (Article 1 of 3) You may be surprised to discover how widespread payroll fraud is. It’s a white-collar crime affecting businesses of all sizes and touching nearly every industry. Consider the following: According to the FBI, $3.5 billion was reported lost in the U.S. as a result of payroll […]
If you work in the cybersecurity sector, you know that the U.S. Department of Defense (DoD) is rolling out a Cybersecurity Maturity Model Certification program, or CMMC, to create stronger cybersecurity standards for contractors working in the DoD supply chain. Over 300,000 firms either currently do business within the Defense Industrial Base (DIB) or intend […]
There’s currently a major adoption occurring around SOAR products Security Orchestration, Automation and Response. What is SOAR? SOAR is next-generation security software products that are designed to automate the common, and fairly remedial tasks that Security Analysts face.
According to The National Retail Federation, retail theft costs U.S. companies $30 Billion a year, with “professional/habitual shoplifters” responsible for 10% ($3b) of all retail theft. And the problem is only getting worse, with losses increasing at 7% year per year. How can you defend yourself against these losses?
There is always a sense of dread when your search head cluster (SHC) goes down. It’s the interface to Splunk, and for the analysts, it’s their window to the data world.
Did you know that Splunk already has built-in health checks that can tell you if something important was misconfigured and alert you to important system or data outages? If you did, you are actually in the minority of users!
Very few organizations begin a Splunk ITSI deployment with their best foot forward. Learn why and what you can do to follow in the footsteps of those that are.