Back in September, we wrote a blog about the Cybersecurity Maturity Model Certification (CMMC) program. In it, we explained how the Department of Defense introduced CMMC in 2019 to strengthen cybersecurity standards for Department of Defense (DoD) contractors. CMMC builds a set of cybersecurity requirements into acquisition programs. It’s designed to help provide the DoD with confirmation that firms within the Defense Industrial Base (DIB) are meeting those requirements. Why a Change from CMMC 1.0 to 2.0? […]
SP6 “What You Need to Know” Series (Article 2 of 3) No business is immune to payroll fraud. It costs U.S. companies millions of dollars each year. Despite its prevalence, many organizations have no idea they’re victims of this type of theft. That’s because it can be extremely difficult to detect. Consider these facts: According to the 2020 Report to the Nations released by the Association of Certified Fraud Examiners (ACFE), organizations […]
Are you considering Splunk’s cloud-based software-as-a-service (SaaS) solution? If so, you’re in good company. Splunk Cloud is an increasingly popular alternative to deploying Splunk on-premises, or in your own cloud environment. This is because Splunk Cloud: Removes the necessity of buying and managing the Splunk infrastructure. Eliminates a significant portion of the administrative overhead tied […]
SP6 “What You Need to Know” Series (Article 1 of 3) You may be surprised to discover how widespread payroll fraud is. It’s a white-collar crime affecting businesses of all sizes and touching nearly every industry. Consider the following: According to the FBI, $3.5 billion was reported lost in the U.S. as a result of payroll […]
As a Splunk Professional Services consultant I have the good fortune of working with really smart and experienced engineers, and the combination of smart and experienced means they’re trying to be as ready as they can for what comes next. In this blog, we’ll discuss how to prepare for a Splunk migration.
What do you do if you have a large number of Deployment Servers (DS) and want to separate business units into different serverclasses? In this article, we will discuss steps you can take to adapt your (DS) to your growing organization.
If you work in the cybersecurity sector, you know that the U.S. Department of Defense (DoD) is rolling out a Cybersecurity Maturity Model Certification program, or CMMC, to create stronger cybersecurity standards for contractors working in the DoD supply chain. Over 300,000 firms either currently do business within the Defense Industrial Base (DIB) or intend […]
To say a lot has change in 2020 is an understatement. The world we live in and work in has dramatically changed these past few months and some changes might last even longer. But even in this unpredictable world, we still look at data to help us solve our problems.
Designing Glass Tables and/or Dashboards is a critical element in your ITSI configuration. The correct implementation will help communication to your visualization audience/consumer. Let’s discuss a few points to help steer your decision making process.
Learn three Splunk deployment best practices that will go a long way in saving you time and face, and allow you to spend your evenings unwinding in peace.