false
Registration for .conf25 is open! Join us in Boston September 8–11.
Registration for .conf25 is open! Join us in Boston September 8–11.
Splunk Blogs
Leadership
3 Min Read
Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Security 13 Min Read

Picture Paints a Thousand Codes: Dissecting Image-Based Steganography in a .NET (Quasar) RAT Loader

Uncover how to identify malicious executable loaders that use steganography to deliver payloads such as Quasar RAT.
Security 11 Min Read

Detecting Suspicious ESXi Activity Before Ransomware Happens

Learn to detect suspicious activity using Splunk, including log ingestion, common indicators, and comprehensive detection strategies for VMware ESXi environments.
Learn 4 Min Read

Inside Kubernetes: A Practical Guide to K8s Architecture and Operational Challenges

Understand the core components of Kubernetes architecture, challenges in operating it, and how observability tools help monitor and optimize deployments.

Using RAG, Splunk ES Content Update App (ESCU), and MLTK to Develop, Enhance, and Analyze Splunk Detections

Learn how to enhance Splunk security detections using a local Llama3 LLM, RAG, MLTK, and ESCU.
Partners 5 Min Read

Leveraging Machine Learning, Splunk Enterprise, the Splunk Edge Hub and MQTT for Data Integration

Leverage existing hardware to build new datasets and insights with the combined power of the Splunk Platform and Cisco Meraki.
.conf & .conf Go 3 Min Read

The Splunk Platform Track at .conf25: 10 Sessions You Can't Miss

Explore the Splunk Platform Track at .conf25! Discover 83 sessions on AI, data management, and digital resilience, including Cisco integrations. Accelerate your Splunk value.
CISO Circle 6 Min Read

Mission Control for Modern Risk

Discover how fusion centers merge cyber, fraud, and ops data into a mission‑control view. Automate response, and reduce risk faster than siloed teams.
Security 13 Min Read

Obey My Logs! AI-Powered Compromised Credential Detection

Splunker Shannon Davis shares a closer look into how to detect compromised credentials with AI-powered PLoB.
Security 1 Min Read

Introducing… The Threat Hunter’s Cookbook!

The security experts on the SURGe team have released The Threat Hunter’s Cookbook, a hands-on guide for security practitioners that features actionable insights into threat hunting methods, ready-to-use queries, and more.