Category: Blog

  • Blog
  • Splunk

What is a SOC and Why Is It Essential for Proactive Threat Detection and Response?

  • AWS
  • Blog

AWS Disaster Recovery Setup: Pilot Light Strategy 

  • Blog
  • Splunk

Troubleshooting Guide: Assets & Identities in Splunk Enterprise Security

  • Blog
  • Splunk

Recovering Deleted or Overwritten Dashboards in Splunk 

  • Blog
  • Splunk

Enterprise Security Threat Intelligence

  • AWS
  • Blog

Simplifying AWS Infrastructure with SSO, CLI, CodeCommit and Terraform

  • Blog
  • Splunk

Routing PII Data to Multiple Indexes

  • AWS
  • Blog

Containerization and Kubernetes: The Backbone of Scalable and Efficient Applications 

  • Blog
  • Latest Thinking

Meet Christy Szanti