Data
modernization

By Ozan Unlu, CEO, Edge Delta In fall 2022, Splunk issued its annual State of Observability Survey and Report, highlighting the increasingly critical role observability plays in enabling multi-cloud visibility and dramatically improving end-user experiences. Growth in observability – or the ability to measure a system’s current state based on the data it generates – […]

Veterans Affairs

The Department of Veterans Affairs (VA) is utilizing capabilities from Splunk to see “into the future” in an attempt to answer questions such as whether or not the agency will hit telehealth capacity, a VA official explained today. […]

Cybersecurity

To help fend off ever-increasing cyberattacks, Splunk is helping organizations to build a foundation of cyber resilience so they can have visibility into cyber threats, accelerate operations, and meet their mission. […]

cybersecurity

As government agencies continue to ward off an increasing number of cyberattacks, they are working to identify gaps and develop strategies to bolster their cyber resilience and maintain mission focus. These attacks, ranging from phishing attacks to ransomware attacks, are only increasing in scope and complexity. While adversaries’ methods may vary, their goals of doing harm are the same. […]

Cybersecurity cyber

Leading technology and security companies are banding together to share tools and products to better guard against cyberattacks, saying their security teams are spending more time correlating a blitz of unintegrated data than detecting and responding to threats. […]

AWS, Teresa Carlson

Teresa Carlson, who left Microsoft in 2010 to found Amazon Web Services (AWS) Public Sector operation and later serve as president and chief growth officer at Splunk, confirmed today that she rejoined Microsoft late last month as corporate vice president and Executive-in-Residence. […]

Splunk’s cybersecurity and Security Orchestration, Automation, and Response (SOAR) suite can be combined with NVIDIA Morpheus running on Hewlett Packard Enterprise’s (HPE) Edgeline GPU-accelerated converged edge platform to provide AI-enabled real-time monitoring and remediation of an edge network, all while saving analysts and data scientists time. […]

On average, it takes 287 days to identify and contain a data breach, according to IBM Security’s 2021 Cost of a Data Breach report. The longer the delay in identifying a breach, the costlier it is. When a breach takes more than 200 days to identify and contain, it cost organizations an average of $4.87 million in 2021, while breaches that took less than 200 days cost an average of $3.61 million, IBM found. […]

Recent waves of cybercrime underscore the importance of increased government visibility before, during, and after a cybersecurity incident. As adversaries continue to target government networks and other infrastructure, efficient event logging is crucial in identifying, investigating, and preventing attacks. President Biden’s May 2021 executive order on cybersecurity set new requirements for event logging, and Office of Management and Budget memorandum M-21-31 in August 2021 provided guidance for agencies on how to meet those requirements. […]

cybersecurity

Even for cybersecurity policy vets like Splunk’s Bill Wright, 2021 has taken the cake as the busiest year for Federal cybersecurity policy in the past decade – at least since 2012 when the big event was a mandatory cyber threat data sharing bill that Sens. John McCain, R-Ariz., and Joe Lieberman, I-Conn., couldn’t quite push over the finish line. […]

modernization

With the vast amount of data available to Federal agencies today, government and private sector experts agreed this week that security teams have a pressing need to leverage automation technologies to better decipher the threat landscape, and to free up their creative capacity to pursue innovation and modernization. […]

Emerging tech

A new survey released by MeriTalk and Splunk finds that public sector IT decision makers are increasingly planning around zero trust security concepts, with that thinking driven by current and future requirements for telework capabilities, among other security management needs. However, agencies face challenges in migrating to zero trust, including the need to invest in foundational technologies, according to findings from the survey of 150 Federal IT decision makers and 150 state, local, and higher education (SLED) IT decisionmakers on their agencies’ efforts around zero trust. […]

Cybersecurity cyber

A plethora of still-developing advanced technologies – plus new systemic approaches that recognize the growing dominance of cloud and managed services – will be key drivers of security improvements for Federal agencies several years from now as they continue to implement the Continuous Diagnostics and Mitigation (CDM) program. […]

A sampling of many of the most important private-sector players supplying technology and services through the Continuous Diagnostics and Mitigation (CDM) Program reveals optimism about the pace of Federal agency implementation of the program. […]

cloud computing

Splunk announced Aug. 21 that it will purchase SignalFx, a software-as-a-service-based platform which provides real-time monitoring and metrics for cloud infrastructure, microservices, and applications. […]

While the Continuous Diagnostics and Mitigation (CDM) program is here to stay for Federal agencies, taking proper approaches to data classification, collection, and analysis are key components to optimizing the program’s aims, security experts said last week at MeriTalk’s Cyber Security Brainstorm event. […]

Big Data Analytics
big data
CDM RSA

Less than two weeks after the end of the partial Federal government shutdown and with the looming threat of another such disruption coming on Feb. 15, will Federal government IT officials in large numbers be making the trip out west to the U.S.’s preeminent cybersecurity conference next month? […]

BSA The Software Alliance

Akamai, a content delivery network and cloud service provider, and Slack, a provider of cloud-based collaboration tools and services, have joined BSA | The Software Alliance as new global policy members. […]

House Cybersecurity and Infrastructure Protection Subcommittee chairman Rep. John Ratcliffe, R-Texas, put the Continuous Diagnostics and Mitigation (CDM) program under the microscope in a hearing with industry experts last week. […]

Categories