false
Registration for .conf25 is open! Join us in Boston September 8–11.
Registration for .conf25 is open! Join us in Boston September 8–11.
Splunk Blogs
Leadership
3 Min Read
Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Using RAG, Splunk ES Content Update App (ESCU), and MLTK to Develop, Enhance, and Analyze Splunk Detections

Learn how to enhance Splunk security detections using a local Llama3 LLM, RAG, MLTK, and ESCU.
Partners 5 Min Read

Leveraging Machine Learning, Splunk Enterprise, the Splunk Edge Hub and MQTT for Data Integration

Leverage existing hardware to build new datasets and insights with the combined power of the Splunk Platform and Cisco Meraki.
.conf & .conf Go 3 Min Read

The Splunk Platform Track at .conf25: 10 Sessions You Can't Miss

Explore the Splunk Platform Track at .conf25! Discover 83 sessions on AI, data management, and digital resilience, including Cisco integrations. Accelerate your Splunk value.
CISO Circle 6 Min Read

Mission Control for Modern Risk

Discover how fusion centers merge cyber, fraud, and ops data into a mission‑control view. Automate response, and reduce risk faster than siloed teams.
Security 13 Min Read

Obey My Logs! AI-Powered Compromised Credential Detection

Splunker Shannon Davis shares a closer look into how to detect compromised credentials with AI-powered PLoB.
Security 1 Min Read

Introducing… The Threat Hunter’s Cookbook!

The security experts on the SURGe team have released The Threat Hunter’s Cookbook, a hands-on guide for security practitioners that features actionable insights into threat hunting methods, ready-to-use queries, and more.
Learn 9 Min Read

What Is Natural Language Processing? A Complete Guide to NLP

Discover what natural language processing (NLP) is, how it works, key techniques, real-world applications, and the main challenges facing the field today.
Learn 5 Min Read

What is ABAC? Attribute Based Access Controls, Explained

Learn what Attribute Based Access Control (ABAC) is, how it works, and why it offers flexible, fine-grained access management for today’s dynamic organizations.

Community Spotlight: A Splunk Expert's Journey

We're putting the spotlight on Mark McCullough, who has been part of the Splunk Community for over a decade and has long been a pillar of support and knowledge sharing.