5 Tips to Keep Your Customers Safe this Holiday Season

After a record-breaking Cyber Monday (with online sales soaring to $6.59 billion - a 16.8% increase over last year), Adobe is predicting that this will be the first-ever holiday season to surpass $100 billion in online sales. This is clearly fantastic news if you're in e-...


Oracle WebCenter Sites and Siteminder

We are far from the days when logging in was as easily implemented as a username, password, and cgi script in between your user’s anonymous and logged-in states. Today’s world is ruled by powerful web access management softwares that not only securely keep intruders from accessing your most secure pages but also allows for a user management system hooked up to your LDAP environment. Among them: HP’s IceWall SSO, IAM (Identity and Access Management), and CA Siteminder. Let’s focus on the latter.

 

Per their website, CA Siteminder promises to...


Brute Force Attacks: Splunk Detection and Analytics

Intro

One of the longest-standing and most common challenges to both information security and web development teams is the brute force attack. Although this form of attack has been around for many years, it is still one of the most popular and widely used password-cracking methods. In terms of impact, brute force attacks are a very serious threat capable of affecting millions of accounts. If these attacks are not detected and addressed in a timely manner they can lead to theft of intellectual property and personally identifiable information, significant financial losses,...


Cutting Risk in Half with Multi-Factor Authentication

We rely on usernames and passwords to access various systems throughout the technology world - from laptops to bank accounts, from cloud storage to blogs - our accounts are protected by these authentication mechanisms. It is easy to forget the importance of these account credentials, until it is too late - if a username and password are breached, an unauthorized user can erase, view, and copy highly sensitive data.

 

Our Whitepaper, Cutting Risk in Half, explores the different methods and real life examples of how much risk...


The Open Front Door to your Data - Announcing a White Paper by Function1

Generations ago, documents and prized objects were hidden from the public, secured in the safes of many homes, offices, banks, and institutions. Under close protection, as well as under lock and key, this tangible-data was protected from unauthorized parties through the implementation of time-tested procedures. 

As the world changed and technology improved, the methodology for approaching and securing this data changed as well. In our February 2015 White Paper, Protecting the CIA, we discussed the importance in protecting the...


Integrating External Asset Databases with the Splunk App for Enterprise Security

Overview

In this post I'd like to cover an approach for integrating an external asset database with the Splunk App for Enterprise Security (ES).  This post is relevant for people just starting out with ES or who have used it for a while and want to improve the integration of their assets information with the application. 

For those wondering what an assets list is in the context of ES, it's a list containing information (such as...


Splunking the Linux Audit System

For my last blog we discussed a Splunk topic geared towards the Windows side of the shop (Splunking Microsoft Windows Firewalls). So now it’s time to show some love to the Linux admins out there. More specifically, in today’s blog we will explore some tips for gaining insight into Linux audit logs using Splunk.

A little background on the Linux Audit System

The Linux Audit system provides a way to track security-relevant information on your...


Red Hat Storage Server, an Innovative Hybrid Storage Solution for Big Data

Big Data surrounds us all, in some shape or form. Typically Big Data (billions or trillions of vast and complex records) is so large, that it requires new and powerful computational resources to process and store. These gigantic sets of data can be analyzed to comprehend patterns, associations, trends, and statistics that help better understand user experience, human behavior, interactions, engagement, etc.

Big Data analysis, such as the services offered by our Function1 Operational Intelligence team, can be provided for a range of industries including but not limited to: financial...


Troubleshooting the Splunk App for Enterprise Security

Intro

Welcome Splunkers! In this post, I'd like to talk about an issue I encountered recently when working on a Splunk App for Enterprise Security v2.2.1 (ES app) deployment and the approach I took in troubleshooting it. But before getting started, I'd like to congratulate Splunk and their Security Products team for winning the SC Magazine Award for "Best Security Information/Event Management (SIEM) Solution." Cheers to a job well done!

Initial Installation

As per...


Passwords: Sharks Can Smell a Breach a Mile Away

2013 is not shaping up to be a banner year for Internet security. 2012 saw data breaches like 6.5 million LinkedIn password hashes leaked, 420,000 member accounts from social network Formspring, Yahoo! Voices more than 400,000 usernames and passwords, 1.5 million passwords from the online dating site eHarmony. Twitter is the latest system to suffer an embarrassing security breach with accompanying data loss. Approximately 250,000 accounts holders have had their usernames, email addresses, session tokens and encrypted/salted versions of passwords stolen. Twitter has been as proactive as...


Stay In Touch