Saul Mulcrow

Lacework FortiCNAPP Explained – Scanning and Reporting – Episode 1

Video Lacework Explained – Scanning and Reporting Episode 1 Series Overview Video Summary This video explores the process of vulnerability scanning and reporting using Lacework, a leading cybersecurity platform. It provides a detailed look at how Lacework handles vulnerabilities in both hosts and containers, focusing on its ability to identify and assess risks within cloud […]

Lacework FortiCNAPP Explained – Scanning and Reporting – Episode 1 Read More »

Splunk Soar Explained Digitising Playbooks

Splunk SOAR Explained – Digitising Playbooks – Episode 5

Video Splunk SOAR Explained – Digitising Playbooks Episode 5 Series Overview Video Summary This video explains how existing incident response playbooks can be digitised using Splunk SOAR to enhance automation and streamline workflows. It outlines two main approaches to playbook design: automated and workflow-oriented. The automated approach focuses on sending events to Splunk SOAR for

Splunk SOAR Explained – Digitising Playbooks – Episode 5 Read More »

Splunk SOAR Explained – Response 101 – Episode 4

Video Splunk SOAR Explained – Response 101 Episode 4 Series Overview Video Summary This video demonstrates how Splunk SOAR (Security Orchestration, Automation, and Response) can be used to streamline event response by automating workflows and improving collaboration within security teams. It explores how data from multiple sources, such as structured data from SIEM systems and

Splunk SOAR Explained – Response 101 – Episode 4 Read More »

Splunk SOAR Explained – Achieving Security Orchestration – Episode 2

Video Splunk SOAR Explained – Achieving Security Orchestration Episode 2 Series Overview Video Summary This video focuses on how security orchestration is achieved within Splunk SOAR through the use of apps. These apps enable the integration and coordination of security functions by connecting various security tools, allowing programmatic control over security actions. With over 350

Splunk SOAR Explained – Achieving Security Orchestration – Episode 2 Read More »

Splunk SOAR Explained – How to Build Playbooks – Episode 3

Video Splunk SOAR Explained – How to Build Playbooks Episode 3 Series Overview Video Summary This video explains the process of building a Playbook within Splunk SOAR using the visual Playbook editor. Playbooks are designed to automate repetitive and time-consuming tasks, making security operations more efficient. A well-crafted Playbook should be easy to maintain and

Splunk SOAR Explained – How to Build Playbooks – Episode 3 Read More »

Splunk for Security Data Models Acceleration - Episode 2

Splunk for Security: Normalisation – CIM Data Models Acceleration – Episode 2

Video Splunk for Security: Normalisation – CIM Data Models Acceleration Episode 2 Series Overview Video Summary In the second episode of our series on the Common Information Model (CIM), we explore how to maximise the benefits of CIM by effectively normalising data. The CIM itself is essentially a comprehensive collection of data models that Splunk

Splunk for Security: Normalisation – CIM Data Models Acceleration – Episode 2 Read More »

Splunk for Security Stream Windows DNS Setup - Episode 7

Splunk for Security: Expansion – Window DNS Monitoring – Episode 4

Video Splunk for Security: Expansion – Windows DNS Monitoring Episode 4 Series Overview Video Summary In the final video of the Splunk for Security: Expansion series, the focus is on setting up Windows DNS monitoring using Splunk Stream. The process begins with navigating to the Splunk Stream app, selecting “Configuration,” and then adding a new

Splunk for Security: Expansion – Window DNS Monitoring – Episode 4 Read More »

Splunk for Security Data Flow Capabilities - Episode 6

Splunk for Security: Expansion – Data-Flow Capabilities – Episode 3

Video Splunk for Security: Expansion – Data-Flow Capabilities Episode 3 Series Overview Video Summary In this third installment of the Splunk for Security: Expansion series, the focus shifts to exploring the capabilities of the Splunk Stream app through its dashboards. The video begins by reviewing the data ingested into Splunk, which is now available for

Splunk for Security: Expansion – Data-Flow Capabilities – Episode 3 Read More »

Splunk for Security Stream Data-Flows - Episode 5

Splunk for Security: Expansion – Stream Data-Flows – Episode 2

Video Splunk for Security: Expansion – Stream Data-Flows Episode 2 Series Overview Video Summary In this instalment of the Splunk for Security Expansion series, we delve into the data flow processes within Splunk Stream. The flow mirrors conventional data handling tools: data is captured by forwarders, which are often installed on HEC servers, and then

Splunk for Security: Expansion – Stream Data-Flows – Episode 2 Read More »

Scroll to Top