false
Registration for .conf25 is open! Join us in Boston September 8–11.
Registration for .conf25 is open! Join us in Boston September 8–11.
Splunk Blogs
Leadership
3 Min Read
Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.

Featured Articles

Security

Learn

Latest Articles

.conf & .conf Go 1 Min Read

Achieve End-To-End Digital Visibility With the Splunk Cloud Platform at .conf25

At .conf25, we're unveiling an array of bold product launches and portfolio enhancements that reaffirm our commitment to your success.
Security 12 Min Read

Beyond the Patch: SharePoint Exploits and the Hidden Threat of IIS Module Persistence

The cybersecurity landscape witnessed a perfect storm in July 2025 when multiple critical SharePoint vulnerabilities collided with sophisticated IIS module-based persistence techniques, creating a nightmare scenario for enterprise defenders.
.conf & .conf Go 3 Min Read

Partners Are the Advantage: Driving the Future at .conf25

Join Cisco and Splunk at .conf25 in Boston for exclusive partner insights, networking, and AI-driven strategies. Discover how partnerships power digital operations, gain executive access, and elevate your brand at the premier event for innovation and growth in the AI-native enterprise.
Learn 8 Min Read

Top 10 SIEM Use Cases Today: Real Examples and Business Value

Explore 10 real-world SIEM use cases — from log aggregation to insider threat detection — with examples, benefits, and tips for implementation.
Security 10 Min Read

CitrixBleed 2: When Memory Leaks Become Session Hijacks

Discover how to detect, mitigate, and respond to CitrixBleed 2 (CVE-2025-5777), a critical Citrix NetScaler ADC and Gateway vulnerability exploited in the wild.
Learn 8 Min Read

Qualitative vs Quantitative: Which Research Method is Right for You?

Learn the differences, uses, and benefits of qualitative vs. quantitative research. Discover how to choose the right method for your data and projects.
Learn 8 Min Read

8 Kubernetes Certifications to Boost Your Cloud Career in 2025: Costs, Levels & Resources Compared

Explore 8 top Kubernetes certifications by level with details on costs, prerequisites, providers, and exam formats — ideal for cloud and DevOps careers.
Learn 7 Min Read

Four Database Types You Need to Know

Discover the four main database types, their features, strengths, and best use cases — plus tips on choosing the right one for your application or business.
Security 20 Min Read

Unlocking Endpoint Network Security Insights with Cisco Network Visibility Module (NVM) and Splunk

Unlock deep endpoint network security insights by integrating Cisco NVM with Splunk.