Share this



Splunk and the Quest for the Holy Grail

Fri, 09/10/2015 - 15:27 | Andrew Walley

The 5th Annual User .conf 15 in Las Vegas was a mass gathering of the faithful. No longer a fringe affair for a few devotees, but more a mass movement, a Woodstock for the 2.0 tech revolution generation. The sea of bodies I observed exiting the keynote session more resembled a rock concert or a major sporting event; the audience bedecked with merchandise and memorabilia and audibly buzzing from what they had just experienced.

Speak your boss’s language with ITSI

Fri, 02/10/2015 - 12:12 | Ian Tinney

Splunk IT Service Intelligence (ITSI) is a next-generation monitoring and analytics solution that provides new levels of visibility into the health and key performance indicators of IT services.

OK, nice tagline. So what’s the problem we are trying to fix and how does ITSI help us?

A new way of thinking about DNS

Thu, 24/09/2015 - 12:58 | Graham McElroy


“You can pretty much at this point assume you have infected devices on your network.” So says Infoblox’s Cricket Liu, and whether we want to admit to it or not, this is likely to be the case.

Security or Cloud?

Mon, 07/09/2015 - 16:13 | Security, Cloud | John Green

If you’ve read Ponemon’s “The Cloud Multiplier Effect” study, you’ll know that adopting Cloud services could increase the probability of a $20 million data breach by up to 3 times. Perhaps even more eye-opening is their revelation that 36% of business-critical applications are housed in the Cloud, but IT doesn’t know about half of them…… 

Infoblox and GSS-TSIG

Thu, 03/09/2015 - 11:51 | Infoblox, GSS-TSIG | Graham McElroy, Centre of Excellence Lead: Core Network Services and Network Automation

An Infoblox NIOS appliance can use GSS-TSIG authentication in one of two modes:

  • GSS-TSIG from Clients to Infoblox DNS Servers
  • GSS-TSIG from Infoblox DHCP Servers to Microsoft DNS

My testing focused in the second option - running an Infoblox DHCP server and having it do DDNS to a MS DNS server, hosting secure AD-integrated zones. I did the following to get it working:

When is a DDoS attack not a DDoS attack?

Thu, 13/08/2015 - 16:48 | DDoS | Jon Shallow

A: When it’s a smokescreen for something even worse.

No: it’s not a joke. I, for one, am not amused to know that I’m one of 2.4 million people whose personal information is in the hands of a group of people I haven’t given my permission to. After the revelation from Carphone Warehouse last week, I’m one the 90,000 being told to “watch out for suspicious activity” in my bank account as my encrypted card details have been accessed.

Elevate to the data lake!

Thu, 28/05/2015 - 10:02 | Splunk, confluent architecture | Andrew Walley

The theme running through Splunk Live! this year was “Elevate”: moving up to the next level, towards the "data lake".

The future of cyber security

Tue, 14/04/2015 - 11:13 | Splunk, cyber security, fetid miasma, confluent architecture | Andrew Walley

Mark Graff, ex-CISO of Nasdaq OMX in New York, recently described a new paradigm for cyber defence based on both the evolution of security systems and that of the threats we have faced over the last 40 years.

Big data is big news

Tue, 17/03/2015 - 16:17 | big data, performance analytics, security analytics | Ian Tinney

Big Data is big news. In an age of insight to drive commercial strategies and realise commercial goals, Big Data lies at the heart of business.

Cyber security - learning from the past

Thu, 15/01/2015 - 10:36 | Splunk, cyber security, confluent architecture | John Green

While the types of attacks, for example distributed denial of service (DDoS) attacks, which seek to disrupt systems and services by crashing an organisation’s website, have not changed, the sophistication of the hackers and their techniques have developed.