Cyber security threats are growing in numbers and severity every year. A cyber threat is no longer just an IT issue. It brings serious business risks that include financial and reputational damage and loss in customer confidence. The widely publicized Facebook-Cambridge Analytica data scandal was...

Then and now The 80s were a period of economic boom and a rise in technology. Cyber crimes were trivial and not financially driven. A small-time hacker disrupting your personal computer was more for the thrill than for financial gain. Malware was used to erase contents...

What is Penetration Testing? Penetration testing is a practice to test IT networks, software, systems, devices, and applications in order to uncover security gaps and vulnerabilities that could be exploited. Penetration testing is also referred to as Pen testing or ethical hacking and enables you to...

We’ve all heard the term Cyber security. But many don’t even know what this term means. Don’t believe me? Just ask around and prepare to be surprised. This blog is an attempt to simplify the term and raise awareness of this phenomena that so many...

In our previous blog titled How data ages in Splunk, we discussed the different stages that data goes through. We explained how data progresses from Hot to Warm to Cold to Frozen and Thawed stages. Data in the frozen stage can either be archived or...

Backing up your data is common sense. But before you decide how to back up your indexed data, you should familiarize yourself with how the indexer stores data in Splunk and how data ages once it has been indexed. We have covered this topic in...

As cybercrimes grow in numbers and sophistication, it has become essential for businesses to take a proactive approach to ensure security against cyber threats. Agile businesses are investing heavily in cybersecurity strategies to eliminate risks and keep sensitive data secure. No business is immune to...