Skip to main content
false
Leadership
6 min read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

Security

Security
6 min read
Announcing the release of Splunk Security Essentials version 3.8.0, which adds maturity journey and benchmarking.
Security 3 Min Read

Staff Picks for Splunk Security Reading March 2024

Welcome to the March 2024 Splunk staff picks, featuring a curated list of presentations, whitepapers, and customer case studies that we feel are worth a read.
Security 4 Min Read

UEBA Superpowers: Enhance Security Visibility with Rich Insights to Take Rapid Action Against Threats

Splunk UBA illuminates hidden corners of your org's digital ecosystem, providing unparalleled visibility into behaviors and patterns that define the network's pulse.
Security 5 Min Read

Add To Chrome? - Part 4: Threat Hunting in 3-Dimensions: M-ATH in the Chrome Web Store

SURGe experiments with a method to find masquerading using M-ATH with Splunk and the DSDL App.
Security 7 Min Read

Detecting New Domains in Splunk (Finding New Evil)

Ready to find "new" domains that may be naughty? We'll walk you through how to use Splunk & Splunk Enterprise Security to do that: get the full story here!

Learn

Latest Articles

Bulletins 1 Min Read

Cribl Litigation Update

An update on Splunk's intellectual property and unfair competition complaint against Cribl filed on October 5, 2022.
Learn 3 Min Read

Threat Assessments & How To Assess a Cyberthreat

To respond to threats effectively, you need to understand what damage that threat can cause. Threat assessments are a crucial part of any cybersecurity strategy.
Learn 9 Min Read

Cloud Strategies: How To Build a Cloud Strategy for Success

Going to the cloud is a no-brainer for many teams and organizations. Still, there’s a smart way to do it: with a cloud strategy. Get the full story here.
Learn 2 Min Read

Log Monitoring with AI: What Makes Monitoring Intelligent?

Monitoring log data offers so many benefits and proactive approaches in your organization. Understand what using AI for log monitoring can do, too.
Splunk Life 2 Min Read

The Endless Possibilities of Diverse Thinking

Splunk's Tom Casey reflects on what it means to be neurodivergent and how valuable it is to include people with different brains.
Learn 3 Min Read

Incident Review: How To Conduct Incident Reviews & Postmortems

Reviewing incidents or doing an “incident postmortem” helps your team learn from incidents. Learn the best ways to maximize the value in your incident review practice.
DevOps 11 Min Read

Don’t Live in the Past - APM 3.0 and Why You Need It

Application Performance Monitoring (APM) as a discipline and as a collection of supporting technologies has evolved rapidly since a distinct recognisable market for APM products first emerged in the 2007 - 2008 time frame. While there are many who would argue that APM has mutated into or been replaced by Observability, it makes more sense to see APM as one of many possible use cases now able to exploit the functionalities that Observability brings to the table - particularly when combined with AI.
Learn 3 Min Read

Data Center Security: Today’s Essentials

Get started with data center security (on-premises and cloud), including what it encompasses, how to secure data centers and important standards to consider.
Learn 6 Min Read

Business Process Reengineering (BPE) Explained

Let’s face it: processes at work don’t always work. Business process reengineering helps you stay on top of constant change while still accomplishing your most important goals.