Skip to main content
false
Swatts
Stephen Watts

Stephen Watts works in growth marketing at Splunk. Stephen holds a degree in Philosophy from Auburn University and is an MSIS candidate at UC Denver. He contributes to a variety of publications including CIO.com, Search Engine Journal, ITSM.Tools, IT Chronicles, DZone, and CompTIA.

Learn 7 Min Read

IT Event Analytics: The Complete Introduction

This blog post covers all the necessary details about event analytics, correlation searches, alerts, and more to get you started.
Learn 9 Min Read

CloudOps: An Introduction to Cloud Operations

Learn the basics of Cloud Operations (CloudOps) in this in-depth blog post.
Learn 4 Min Read

Kotter’s 8 Steps for Leading Change in Organizations

Organizational change is hard. But following 8 steps will help! Read on for practical tips and insights for success with the Kotter 8 step process.
Learn 4 Min Read

DevOps Release Management Concepts & Best Practices

Explore DevOps release management best practices that help your team automate and maintain rapid deployment schedules for releasing reliable software faster.
Learn 2 Min Read

Common Event Format (CEF): An Introduction

In this blog post, we'll take a look at common event format (CEF) s a standard for the interoperability of event- or log generating devices and applications.
Learn 4 Min Read

Top 5 Incident Response Metrics with Real-World Examples & Impact

Understand key metrics essential to incident response. Leverage these metrics, along with incident management KPIs, to provide added value to your customers.
Learn 5 Min Read

Using Splunk for SEO Log File Analysis

This blog post will showcase just a few of the ways we’re using Splunk to improve our own technical SEO.
Learn 5 Min Read

Machine Data: An Introduction

This blog post will explore what machine data is, how it’s used, common examples of machine data, why it’s important and more.
Learn 1 Min Read

Splunk MINT: A Complete Introduction

Looking for Splunk MINT? This blog post explains in detail what Splunk MINT was, what happened to Splunk MINT, and much more.
Learn 2 Min Read

Splunk Light: An Introduction and Beginner's Guide

Looking for Splunk Light? This blog post explains in detail what Splunk Light was, what happened to Splunk Light, and much more.
Learn 4 Min Read

Is Blockchain Dead? No. Is Web3 Dead? Maybe.

This blog post explores trends around Web3, Blockchain, NFTs, Cryptocurrency, and related technologies.
Learn 5 Min Read

The CISO Role: What Does a Chief Information Security Officer Do?

Understand the vital role of CISO, including responsibilities, skills and experience, reporting & hierarchy, salary ranges and how to hire a CISO.
Learn 3 Min Read

What’s Cloud SIEM? Security Incident & Event Monitoring in the Cloud

SIEM solutions have become go-to components of any cybersecurity practice. But what happens to SIEM in the cloud? Learn all about cloud SIEM in this article.
Learn 6 Min Read

What is Vulnerability Management?

Read about how a strong vulnerability management program gives companies the capacity to easily detect vulnerabilities early before they become real threats.
Learn 4 Min Read

Cloud Network Monitoring: An Introduction

Network monitoring vs cloud monitoring: do you really need both? Find out why cloud network monitoring is the key to business success in this article.
Learn 3 Min Read

Using Threat Intelligence To Advance Your Security Posture

This article helps you begin a threat intelligence program and includes techniques for incorporating threat intelligence into your cybersecurity strategy.
Learn 4 Min Read

Network-as-Code Explained

See how Network as Code provides consistency in environment configurations that manual configuration management processes cannot easily deliver.
Learn 5 Min Read

Trunk-Based Development vs. GitFlow: Which Source Code Control is Right for You?

Understand trunk-based development and GitFlow, two source code management approaches, so you can decide which is right for your developer environment.
Learn 5 Min Read

What Is TBD? Trunk-Based Development & Its Role in CI/CD

Trunk-based development is a popular way to control source code when developing apps. Learn how TBD works, how it supports CI/CD, and when to avoid it.
Learn 5 Min Read

Status Pages: The Ultimate Guide

Status pages show real-time status of applications and services. See how these best practices make status pages succeed — and why that’s crucial for business.
Learn 4 Min Read

The Very Best Blockchain & Web3 Podcasts

In this blog post we review some of the most important - and informative - podcast series in the Web3 & Blockchain space.
Learn 4 Min Read

Production Environment Review: The Ultimate Checklist

Make releases smoother! Check this list for all the areas you want to review in production environments to improve release quality and cadence.
Learn 7 Min Read

When and Why To Adopt Feature Flags

Learn all about feature flags, a powerful way to fine-tune your control over which features are enabled within a software deployment.
Learn 4 Min Read

Best DevOps Books: The Definitive List

In this blog post we’ll look at the core, fundamental books that have played the largest role in creating the modern DevOps movement.