Splunk: Deal-Closing Rate Rebounded In Fourth Quarter
Company sees continued demand for its big data platform for digital security tasks, says SolarWinds attack highlights the need for “timely detection capabilities.” By Rick Whiting March 04, 2021, 03:10 PM EST
A slowdown in deal closings big data software developer Splunk experienced in its fiscal third quarter, which the company attributed to ongoing uncertainty from the COVID-19 pandemic, did not continue into the fourth quarter, company executives said this week in announcing Splunk’s fiscal 2021 fourth-quarter and year-end results.
Splunk CEO Doug Merritt (pictured), during an earnings call with financial analysts, also noted that the fallout from the SolarWinds cybersecurity attack points to the value of the Splunk Enterprise and Splunk Cloud platforms and Splunk Enterprise Security solution for detecting and responding to cybersecurity hacks.
A Second Hacker Group May Have Also Breached SolarWinds, Microsoft Says
As the probe into the SolarWinds supply chain attack continues, new digital forensic evidence has brought to light that a separate threat actor may have been abusing the IT infrastructure provider s Orion software to drop a similar persistent backdoor on target systems. The investigation of the whole SolarWinds compromise led to the discovery of an additional malware that also affects the SolarWinds Orion product but has been determined to be likely unrelated to this compromise and used by a different threat actor, Microsoft 365 research team said on Friday in a post detailing the Sunburst malware.
The Department of Commerce was one of many agencies and companies attacked worldwide by Russiaâs APT 29 via SolarWinds Orion servers. Todayâs special columnist, Kelvin Coleman of the NCSA, offers some analysis and practical advice for security pros. Tim Evanson Creative Commons Attribution-ShareAlike 2.0 Generic (CC BY-SA 2.0)
Although the true scope of the SolarWinds attack has not been fully uncovered, thereâs no doubting the level of sophistication required to carry these attacks on numerous government agencies, including the US Treasury, Commerce Department and the Department of Homeland Security.
Considering how long its discovery remained dormant, the amount of coverage weâre seeing in the mainstream media and the levels of concern out of the intelligence community are no surprise. As details emerge â almost in real-time â weâll continue to have better clarity as to the logistics, tactics and motivations behind the incident. In the meantime
The U.S. Treasury Department was part of a massive supply chain attack on the SolarWinds IT management platform by Russiaâs APT 29 group. Todayâs columnist, Sam Curry of Cybereason, offers some analysis of the prolific hack and advice for security teams on how to respond. R BoedCreative CommonsAttribution 4.0 International
News over the weekend of a massive breach by Russiaâs APT 29 against the U.S. Treasury and U.S. Commerce Departments was eye-opening in its intensity. In addition, the CISA emergency directive urging all public and private sector organizations to assess their exposure and disconnect or power down the SolarWinds Orion products the attacks were tied to was a rare move: CISA issued such a directive for only the fifth time in its history.