Splunk's 'The New Rules of Data Management: Creating Value in the AI Era' report captures trending shifts in data management and examines how organizations are structuring — and should be potentially rethinking — their data strategies.
Remote Employment Fraud actors don’t steal credentials—they’re issued them. This blog explores early detection and why security can’t face this threat alone.
Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Learn how Splunk Global Security runs ops at scale and enables the business by focusing on what matters—solving problems through data, automation, and collaboration.
Large language models have changed the world. What about small language models? Learn what SLMs are, how they differ from LLMs, and why SLMs are the future.
Telemetry is powerful data that can tell you all sorts of important information. Know what you can do with this useful data — get the full telemetry 101 here.
Learn all about SCA. Software composition analysis is a type of security testing that identifies the open-source and third-party components used in modern software.
Learn how to make data collection fun. Splunkers Robert Castley and Kyle Prins are sharing how they used iOS Shortcuts at RSAC to track every t-shirt they handed out, then piping that data straight into Splunk Cloud for real-time analytics.
Explore the Software Development Lifecycle (SDLC), its stages, importance, and popular models like Agile, Waterfall, and Iterative, for efficient software creation.
Learn how to transform raw telemetry into actionable insights by enriching it with consistent tagging and metadata. That’s the power of contextual observability.
Active and passive monitoring: which one is for you? Let’s look at the two methods, along with their use cases, data volumes, and control over the data.