Archived Events
The demand continues to grow for extensive implementations of monitoring architectures across enterprise and specific mission-level infrastructure and applications. With that the need to be able to scale, debug, and optimize complex environments increases also. It’s time to break down data silos, eliminate networking ...
Federal security professionals within the DoD must comply with the technical testing and hardening frameworks known as STIGs — Security Technical Implementation Guides. STIGs contain technical guidance for “locking down” or “hardening” information systems/software that might be vulnerable to a ...
As the world braces for a possible recession, companies are already beginning to tighten their belts and restrict spending in security departments. Yet, if 2021 and the explosion of ransomware, new nation-state-sponsored security attacks, and the skyrocketing cyber insurance premiums taught us anything, it is that security ...
Today's higher education institutions are facing greater financial risk due to an increase in both internal and external fraud. While some institutions are using traditional security tools to detect certain types of fraud, the vast increase in the types of fraud requires a different approach to build out a comprehensive ...
Participants joined us for the continuation of our informative, hands-on virtual workshops where your IT teams had the opportunity to increase the level of Splunk skillsets across your organization.