Then and now The 80s were a period of economic boom and a rise in technology. Cyber crimes were trivial and not financially driven. A small-time hacker disrupting your personal computer was more for the thrill than for financial gain. Malware was used to erase contents...

Backing up your data is common sense. But before you decide how to back up your indexed data, you should familiarize yourself with how the indexer stores data in Splunk and how data ages once it has been indexed. We have covered this topic in...

As cybercrimes grow in numbers and sophistication, it has become essential for businesses to take a proactive approach to ensure security against cyber threats. Agile businesses are investing heavily in cybersecurity strategies to eliminate risks and keep sensitive data secure. No business is immune to...

In the last blog, we covered the basics of Splunk when getting started. We briefly touched upon working in data and how Splunk stores and works with data. If you need a refresher on the basics again, read here. In this blog, we’ll try to...