Skip to main content
false
Leadership
6 Min Read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

Security

Learn

Latest Articles

Learn 4 Min Read

What is Privilege Escalation? An Introduction

Learn about privilege escalation, a security exploit that elevates user access rights, its types, attack methods, risks, and best practices for prevention.

Managing Splunk Add-Ons with UCC Framework

The UCC framework is designed for Splunk users and developers who want to improve their add-on development process and management.
Learn 7 Min Read

RSA Algorithm in Cryptography: Rivest Shamir Adleman Explained

This article describes RSA algorithm, how it works, and its major applications in cryptography. It also explains the vulnerabilities of RSA.
Observability 4 Min Read

Observations from .conf Go: Why Every Business Needs Observability

Raen Lim, Splunk Group Vice President, explains why building robust digital resilience — supported by strong observability — is essential.
Learn 3 Min Read

What is Spoofing? An Introduction

Learn about spoofing: types like email, IP, DNS, and GPS spoofing, how attackers exploit them, and tips to protect yourself from these cyber threats.
Splunk Life 2 Min Read

How Aditya Builds Digital Resilience as a Software Engineer

Aditya Bhatia shares what he does in his day-to-day as a software development engineer on our Control Loop team and how he’s grown at Splunk.
Security 3 Min Read

Splunk Security Content for Threat Detection & Response: Q3 Roundup

Learn about the latest security content from Splunk.
Learn 6 Min Read

Configuration Management & Configuration Items (CI) Explained

Protect your systems and ensure stability with configuration management. Discover the benefits and implement an effective strategy for your business.
Learn 4 Min Read

What is Continuous Improvement?

Explore continuous improvement principles, Lean techniques like Agile, Scrum, and Kanban, and how IT leaders use them to enhance value and efficiency.