Saul Mulcrow

Splunk SOAR Explained – How to Build Playbooks – Episode 3

Video Splunk SOAR Explained – How to Build Playbooks Episode 3 Series Overview Video Summary This video explains the process of building a Playbook within Splunk SOAR using the visual Playbook editor. Playbooks are designed to automate repetitive and time-consuming tasks, making security operations more efficient. A well-crafted Playbook should be easy to maintain and […]

Splunk SOAR Explained – How to Build Playbooks – Episode 3 Read More »

Splunk for Security Data Models Acceleration - Episode 2

Splunk for Security: Normalisation – CIM Data Models Acceleration – Episode 2

Video Splunk for Security: Normalisation – CIM Data Models Acceleration Episode 2 Series Overview Video Summary In the second episode of our series on the Common Information Model (CIM), we explore how to maximise the benefits of CIM by effectively normalising data. The CIM itself is essentially a comprehensive collection of data models that Splunk

Splunk for Security: Normalisation – CIM Data Models Acceleration – Episode 2 Read More »

Splunk for Security Stream Windows DNS Setup - Episode 7

Splunk for Security: Expansion – Window DNS Monitoring – Episode 4

Video Splunk for Security: Expansion – Windows DNS Monitoring Episode 4 Series Overview Video Summary In the final video of the Splunk for Security: Expansion series, the focus is on setting up Windows DNS monitoring using Splunk Stream. The process begins with navigating to the Splunk Stream app, selecting “Configuration,” and then adding a new

Splunk for Security: Expansion – Window DNS Monitoring – Episode 4 Read More »

Splunk for Security Data Flow Capabilities - Episode 6

Splunk for Security: Expansion – Data-Flow Capabilities – Episode 3

Video Splunk for Security: Expansion – Data-Flow Capabilities Episode 3 Series Overview Video Summary In this third installment of the Splunk for Security: Expansion series, the focus shifts to exploring the capabilities of the Splunk Stream app through its dashboards. The video begins by reviewing the data ingested into Splunk, which is now available for

Splunk for Security: Expansion – Data-Flow Capabilities – Episode 3 Read More »

Splunk for Security Stream Data-Flows - Episode 5

Splunk for Security: Expansion – Stream Data-Flows – Episode 2

Video Splunk for Security: Expansion – Stream Data-Flows Episode 2 Series Overview Video Summary In this instalment of the Splunk for Security Expansion series, we delve into the data flow processes within Splunk Stream. The flow mirrors conventional data handling tools: data is captured by forwarders, which are often installed on HEC servers, and then

Splunk for Security: Expansion – Stream Data-Flows – Episode 2 Read More »

Splunk for Security Architecting Streaming - Episode 4

Splunk for Security: Expansion – Architecting Splunk Streams – Episode 1

Video Splunk for Security: Expansion – Architecting Splunk Streams Episode 1 Series Overview Video Summary In this first episode of the Splunk for Security: Expansion series, we explore the architecture and deployment of the Splunk Stream app. Splunk Stream provides real-time visibility into application and infrastructure performance by passively collecting data from the network, without

Splunk for Security: Expansion – Architecting Splunk Streams – Episode 1 Read More »

Splunk for Security What is the Common Information Model (CIM) - Episode 3

Splunk for Security: Normalisation – Understanding CIM – Episode 3

Video Splunk for Security: Normalisation – Understanding CIM Episode 3 Series Overview Video Summary In the third episode of our series on the Common Information Model (CIM), we explore how to maximise the benefits of CIM by effectively normalising data. The CIM itself is essentially a comprehensive collection of data models that Splunk continuously updates

Splunk for Security: Normalisation – Understanding CIM – Episode 3 Read More »

Splunk for Security CIM Data Models 101 - Episode 1

Splunk for Security: Normalisation – CIM Data Models 101 – Episode 1

Video Splunk for Security: Normalisation – CIM Data Models 101 Episode 1 Series Overview Video Summary This video is the first in a series focusing on the Common Information Model (CIM) and its role in data normalisation. It introduces data models, explaining how they standardise data from multiple sources by aligning different field names and

Splunk for Security: Normalisation – CIM Data Models 101 – Episode 1 Read More »

Varonis Explained – DatAdvantage Cloud Introduction – Episode 6

Video Varonis Explained – DatAdvantage Cloud Episode 6 Series Overview Video Summary Varonis DatAdvantage Cloud is a robust solution designed to help businesses protect and manage their cloud data effectively. As more organisations adopt cloud applications like AWS, Google, Salesforce, and Slack, managing security across these platforms becomes increasingly challenging. DatAdvantage Cloud offers a centralised

Varonis Explained – DatAdvantage Cloud Introduction – Episode 6 Read More »

Varonis Explained – DatAdvantage Cloud and Salesforce – Episode 5

Video Varonis Explained – DatAdvantage Cloud for Salesforce Episode 5 Series Overview Video Summary Varonis DatAdvantage Cloud for Salesforce is a powerful solution designed to help organisations safeguard sensitive data within their Salesforce environments. Salesforce, a widely used CRM platform, holds a wealth of sensitive business information, including personal data, contracts, and pricing documents. Varonis

Varonis Explained – DatAdvantage Cloud and Salesforce – Episode 5 Read More »

Scroll to Top