Share this

Blog

Archive

When is a DDoS attack not a DDoS attack?

Thu, 13/08/2015 - 16:48 | Jon Shallow

A: When it’s a smokescreen for something even worse.

No: it’s not a joke. I, for one, am not amused to know that I’m one of 2.4 million people whose personal information is in the hands of a group of people I haven’t given my permission to. After the revelation from Carphone Warehouse last week, I’m one the 90,000 being told to “watch out for suspicious activity” in my bank account as my encrypted card details have been accessed.

Elevate to the data lake!

Thu, 28/05/2015 - 10:02 | Andrew Walley

The theme running through Splunk Live! this year was “Elevate”: moving up to the next level, towards the "data lake".

The future of cyber security

Tue, 14/04/2015 - 11:13 | Splunk, cyber security, fetid miasma, confluent architecture | Andrew Walley

Mark Graff, ex-CISO of Nasdaq OMX in New York, recently described a new paradigm for cyber defence based on both the evolution of security systems and that of the threats we have faced over the last 40 years.

Big data is big news

Tue, 17/03/2015 - 16:17 | big data, performance analytics, security analytics | Ian Tinney

Big Data is big news. In an age of insight to drive commercial strategies and realise commercial goals, Big Data lies at the heart of business.

Cyber security - learning from the past

Thu, 15/01/2015 - 10:36 | Splunk, cyber security, confluent architecture | John Green

While the types of attacks, for example distributed denial of service (DDoS) attacks, which seek to disrupt systems and services by crashing an organisation’s website, have not changed, the sophistication of the hackers and their techniques have developed.

Big Data: at the heart of the Internet of Things

Mon, 01/12/2014 - 10:30 | Internet of Things, IoT, big data | Ian Tinney

The Internet of Things (IoT) is all about collecting data from a great many small sensors or devices and then being able to turn all that data into valuable, actionable insight.

Applications of IoT have so far been largely industrial but there are some interesting developments in, for example, automotive and mobile technologies too.

Big data: open source or commercial?

Mon, 17/11/2014 - 15:44 | Open Source, Splunk | Ian Tinney

What’s right for one person is not right for another. It’s the same with Big Data solutions. While, for some, Open Source solutions are appropriate, the vast majority understands that the long-term value of a commercial solution far outweighs the ostensibly cost-free option.

Splunk enterprise 6.2

Mon, 27/10/2014 - 15:55 | Splunk | Ian Tinney

Splunk Enterprise 6.2 is the latest release and adds important new capabilities to the leading platform for real-time operational intelligence.

Configuring Infoblox Microsoft synchronisation

Mon, 29/09/2014 - 16:04 | Microsoft DHCP, Infoblox | Accumuli Security

 

One of the main issues we encounter when configuring Infoblox grid’s to synchronise with a Microsoft DHCP server is around permissions or admin rights – typically for security the requirement is to only assign the minimum of permissions strictly necessary to perform the synchronisation.

This means no admin rights and the account being used to synchronise with AD is added to the "DHCP Users" group (yes, not even "DHCP Administrators" is strictly necessary).