Security in Obscurity

Thoughts by Jeff Stein

Manipulating tokens in Splunk

In a previous thought I covered the different ways in which tokens can be leveraged in Splunk dashboarding, March 2019

Tokens are a great way to engage your dashboard audience by allowing them to provide input on the value of data as well as dynamically filter visualizations. In addition to using tokens to guide the visualization of the data on a dashboard you can manipulate the tokens, set on the dashboard, and change the value associated with them.


Best Practices For Conducting A Vulnerability Assessment

In a previous thought I covered the differences between a vulnerability assessment and a penetration test, February 2019

There are three main steps that should always take place during a vulnerability assessment. These steps cover the discovery, enumeration and detection phases of the vulnerability assessment. Following all three of these steps will ensure you are providing a solid foundation for your vulnerability management program.


Different ways to use a $token$ in Splunk

With the right knowledge you can use tokens to not just display data but rather engage your audience by providing them the tools to interactive and guide the visualization of the data, January 2019

Working in information security I find Splunk is a very beneficial tool to use in normalizing and reviewing data to identify areas of concern. Dashboards are a great way to visualize that data in Splunk. With the right knowledge you can use tokens to not just display data but rather engage your audience by providing them the tools to interactive and guide the visualization of the data. With that in mind I thought I would highlight some of my favorite ways to leverage tokens on a dashboard.


Understanding the difference between a penetration test and a vulnerability assessment

A look at the different purposes between pen tests and vulnerability assessments, December 2018

Vulnerability assessments and penetration tests are two very common vulnerability management techniques used to better secure an environment. While both can be encompassed in a vulnerability management program each serves a different purpose with potentially very different security objectives.


Guide to counter denial-of-service (DoS) and DDoS attacks: Remediate an attack in progress (Part 3)

DoS Guide: Part 3 of 4, December 2018

What can you do to counter a denial-of-service attack? There are a number of ways to counter denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks. This thought focuses on ways to remediate an attack in progress and is a part of a four part series on countering DoS and DDoS attacks.


Tags

Thoughts Scripts Published Works Courses