false
Registration for .conf25 is open! Join us in Boston September 8–11.
Registration for .conf25 is open! Join us in Boston September 8–11.
Splunk Blogs
Leadership
6 Min Read
Splunk announces innovations across its observability portfolio to provide organizations deeper visibility into their network health through integrations with Cisco, and faster troubleshooting with the help of AI.

Featured Articles

Security

Learn

Latest Articles

Security 10 Min Read

CitrixBleed 2: When Memory Leaks Become Session Hijacks

Discover how to detect, mitigate, and respond to CitrixBleed 2 (CVE-2025-5777), a critical Citrix NetScaler ADC and Gateway vulnerability exploited in the wild.
Learn 7 Min Read

Four Database Types You Need to Know

Discover the four main database types, their features, strengths, and best use cases — plus tips on choosing the right one for your application or business.
Security 20 Min Read

Unlocking Endpoint Network Security Insights with Cisco Network Visibility Module (NVM) and Splunk

Unlock deep endpoint network security insights by integrating Cisco NVM with Splunk.
Learn 9 Min Read

What Is Detection as Code (DaC)? Benefits, Tools, and Real-World Use Cases

Learn how Detection as Code transforms security rule management with Git, CI/CD, and automation. See real examples and tools to get started.
Learn 6 Min Read

IT Service Performance Monitoring: Key Metrics, Best Practices, and Future Trends

Monitor IT service performance to ensure reliability and efficiency. Learn key metrics, best practices, and how modern tools help optimize cloud-based IT systems.
Industries 2 Min Read

Introducing IPv6 Support for AWS Regions and Splunk Offerings

Splunk now supports IPv6 across AWS FedRAMP, DoD, Commercial, and Enterprise platforms.
Observability 7 Min Read

Operationalizing Observability: How To Integrate with IT’s Existing Workflows

Learn how to embed observability into existing IT workflows. This practical integration framework makes it easy and scales across the enterprise.
Learn 5 Min Read

Scattered Spider Isn’t a Glitch, It’s a Warning

Scattered Spider uses social engineering to exploit identity systems and disrupt business operations. Boards must act urgently to close these gaps.
Learn 7 Min Read

The Complete Guide to CI/CD Pipeline Monitoring: Metrics, Tools, and Best Practices for Delivery Visibility

Monitor CI/CD pipelines with key metrics, best practices, and tool integrations to boost reliability, agility, and software delivery performance.