Skip to main content
false
Leadership
6 Min Read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

Security

Security
3 Min Read
Announcing the availability of Cisco Talos Incident Response services to Splunk customers.
Security 8 Min Read

Observability Meets Security: Build a Baseline To Climb the PEAK

Splunker James Hodgkinson looks at how to apply the baseline hunting process to some common O11y data sources and shows how the OpenTelemetry standard offers easier data analysis.
Security 11 Min Read

LLM Security: Splunk & OWASP Top 10 for LLM-based Applications

Threats to LLMs are real. Let’s look at top LLM threats and show you how, with Splunk, you can better defend LLM-based applications and their users.
Security 3 Min Read

Comprehensive, Continuous, and Compliant: Obtain Proactive Insights with Splunk Asset and Risk Intelligence

Announcing the release of the latest addition to our security product portfolio, Splunk Asset and Risk Intelligence.
Security 2 Min Read

Announcing General Availability of Cisco Talos Intelligence in Splunk Attack Analyzer

We are pleased to announce the general availability of Cisco Talos threat intelligence to all Splunk Attack Analyzer customers globally.

Learn

Latest Articles

Learn 8 Min Read

What Is Threat Hunting?

The goal of threat hunting is not only to find more security incidents but to improve automated detection capabilities over time. Learn how and why.
Platform 3 Min Read

Enhanced Maintenance Experience in Splunk Cloud Platform

Splunk is excited to announce a significant upgrade to our maintenance experience, designed to provide you with greater control and minimal impact.
Learn 5 Min Read

Snort Rules 101: Examples & Use Cases for Snort Network Defense

Learn how Snort rules enhance network defense by identifying and blocking potential threats, providing customizable protection against evolving cyberattacks.

Splunk in One Word

In celebration of Customer Experience Day 2024, we share a closer look at how our customers perceive and describe Splunk.
Learn 10 Min Read

Data Pipelines & Optimizing Pipeline Efficiency

Data pipelines: everyone has one, but exactly what are they? We're telling the full story here, including why data pipelines are only growing in importance.
Learn 4 Min Read

Information vs. Operational Technology: IT vs. OT Explained

Explore the differences between IT and OT, their roles in cybersecurity, and how their convergence is reshaping industrial efficiency and safeguarding critical systems.
Learn 4 Min Read

What Is Lateral Movement?

Lateral movement is one way threat actors can exploit your protected systems and networks. Get the full story here.
Industries 2 Min Read

Splunk Cloud Attains FedRAMP High Authorization

Splunk is proud to announce that Splunk Cloud Platform has received FedRAMP authorization at a High impact level from the General Services Administration (GSA) FedRAMP Program Management Office (PMO).
Learn 4 Min Read

IT Strategic Planning: A How-To Guide

An IT strategy is a specific plan for how digital technology and assets should be used to meet organizational goals. Read on for how to create your own IT strategy.