PinnedInfoSecNinjaDeep Dive on the popular Log4Shell Remote Code Execution vulnerability in Apache Log4jRCE vuln. in Apache Log4jJul 29, 2022Jul 29, 2022
InfoSecNinjaEncrypting Data in Motion between Splunk (Enterprise & UF) and Cribl StreamA series of 4 blogs about Encrypting data in motion between Splunk and CriblOct 31, 2023Oct 31, 2023
InfoSecNinjaSecuring the data in motion from Splunk Universal/Heavy Forwarder to Cribl Host using TLS certsA series of 4 blogs about Encrypting data in motion between Splunk and CriblSep 19, 2023Sep 19, 2023
InfoSecNinjaSecuring the data in motion from Cribl host to Splunk Indexer using TLS certsA series of 4 blogs about Encrypting data in motion between Splunk and CriblSep 19, 2023Sep 19, 2023
InfoSecNinjaTypes of Splunk Search CommandsThere are six broad types for all of the search commands:Sep 19, 2023Sep 19, 2023
InfoSecNinjaGenerating the Domain name and TLS Certs/keyPart 1 — Generating the Domain name and TLS Certs/key for encrypting data in motion and webUI.Sep 15, 2023Sep 15, 2023