Posts Tagged ‘splunk’

Istock 898079472333

How Splunk Analysis and Kafka Connect Works

General Introduction Splunk Connect for Kafka is a sink connector that allows a Splunk software administrator to subscribe to a Kafka topic and stream the data to the Splunk HTTP Event Collector. After the Splunk platform indexes the events, you can then directly analyze the data or use it as a contextual data feed to […]

Istock 863101634

Detect Ransomware Using Splunk

Ransomware has become one of the most common and lucrative forms of malware, recently eclipsing even credit card theft incidents. With the potential for huge profits, you can be sure hackers will be coming up with even more effective and dangerous attacks.  Recent ransomware attacks include data exfiltration, that is then held for ransom. Limitations […]

Web Server Data Analysis Using Splunk

Business Scenario: In an e-commerce website, we have certain queries such as how many customers are visiting a particular product but not purchasing the product. What are the reasons for not purchasing the product? Maybe the price of the product is too high? What products have customers added to their cart but not purchased? This […]

Time for a Splunk Health Assessment?

Over time, a Splunk environment can become unstable due to environment complexity and configuration concerns. Common issues include distributed deployments, misconfigurations, configuration file creep, partially correct data on-boarding, poor query construction, improperly sized systems, log files containing multiple formats, date/time skew, user rights, and many other factors. Splunk environments should be reviewed on a periodic […]

Telecom Implements Splunk to Help with Network Optimization

It’s no secret that data is accelerating at a dramatic pace in terms of volume, velocity, variety, and variability. According to International Data Corporation (IDC), unstructured data accounts for more than 90% of the information in today’s organizations and its use is accelerating. Of the many different types of Big Data and unstructured data, machine data […]

4 Security Takeaways from the FBI

4 Security Takeaways From The FBI

As IT consultants, we’re pretty sure that we’re smart enough to recognize phishing attacks against us. We all get emails asking us to open invoices, confirm our bank account information, or perform other actions designed to separate us from our credentials and our money. But according to a consultant specializing in penetration testing, 40% of us will still […]

3 BI And Analytics Trends That Are Hard To Deny

  According to IBM, we generate 2.5 quintillion bytes of data every day. And, 90% of the data that exists today, whether found in your clinical systems, on social media, or on your mobile devices, has been gathered within the last two years. All of that is what we call “big data.” As the volume […]

Thanks Godfrey Sullivan, First Ballot Hall of Famer

“Godfrey, I think history is going to judge you as one of the truly iconic Silicon Valley CEOs.” –Greg McDowell, JMP Securities Analyst (11/19/2015) With Splunk’s Q3 earnings release was the additional announcement that Godfrey Sullivan would be handing over the CEO reins to Doug Merritt. I don’t know Silicon Valley history enough to confirm […]

Cyber Security Awareness Month brings plenty of awareness

October 1st marked the beginning of the United States’ National Cyber Security Awareness month.  Three days into the month, awareness is exactly what we have. Last week, Experian and T-Mobile announced a significant data breach.  What’s worse is that the hackers were able to maintain the breach for over two years.  T-Mobile CEO John Legere, […]

Big Data and the Skies

Earlier this week, I read a news article about the use of Twitter, or more accurately, the use of data collected from Twitter to prohibit a passenger from boarding a United Airlines flight. Strangely enough, the person banned from the flight was probably among the people who should know the most about cyber-security and perceived […]

security and development

The New National Emergency: Cyber Threats

In a blog post earlier this year, I discussed the increasing role data security is playing in the world today.  As mentioned in the article, 2014 was dubbed the “Year of the Data Breach”.  Around the time of the post, Sony had just been hacked.  Subsequently we learned there was credible evidence the cyber-attack was […]

What is Your Big Data Strategy…?

Big Data is big deal. Every vendor has a strategy and a suite of products. Navigating the maze and picking the right Big Data platform and tools takes some level of planning and looking beyond techie’s dream product suite. Compounding the issue is the open source option vs. going with a vendor version of the […]

Load More