Skip to main content
false
Leadership
6 min read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

.conf24

.conf & .conf Go
2 min read
Invest in your professional development and take your Splunk expertise to new heights with Splunk University and .conf24.
.conf & .conf Go 2 Min Read

Get Ready for .conf24: A Can’t-Miss For Security Professionals

Splunker Dane Disimino dives into what makes .conf24 an essential gathering for security experts.
.conf & .conf Go 3 Min Read

Explore All the Splunk Platform Has To Offer at .conf24!

Splunker Anna Mensing highlights the top Splunk Platform sessions at .conf24 and why they are not to be missed.
.conf & .conf Go 3 Min Read

.conf24 Global Broadcast: The Complete Guide

Curious about the .conf Global Broadcast from Splunk? Check out this article for all the details, answers, and excitement about what to expect.
.conf & .conf Go 1 Min Read

The Splunkie Awards Open Nominations for 2024

The Splunkie Awards are back and more exciting than ever because for the first time this year, we’re bringing the Global Partner Awards to the Splunkies at .conf24.

Learn

Latest Articles

Learn 5 Min Read

Cryptographically Relevant Quantum Computers (CRQCs) & The Quantum Threat

Quantum computing sounds scary (depending on your source), but you don't have to be worried! Get expert information on today's quantum threat.
Security 2 Min Read

Making Sense of the New SEC Cybersecurity Rules and What They Could Mean for Your Company

The United States Securities and Exchange Commission’s (SEC) July 26 approval of new cybersecurity 'incident' disclosure rules is top of mind for every public company, and understanding what it means and how companies will be held accountable is crucial.
Learn 4 Min Read

Moore's Law: A Complete Introduction

Explore Moore's Law: 50 years of exponential transistor growth, its impact on tech, industry, and cloud. Will the trend continue?
IT 7 Min Read

ML-Powered Assistance for Adaptive Thresholding in ITSI

ML-Assisted Thresholding provides recommendations for time policies, algorithms, and thresholds for Splunk ITSI adaptive thresholding.
Learn 8 Min Read

IoT Monitoring: Protecting & Maintaining IoT Devices

Explore the evolving landscape of IoT cybersecurity. Learn why IoT security matters, benefits of IoT monitoring, and tools to safeguard your IoT ecosystem.
Learn 8 Min Read

IT Event Correlation: Software, Techniques and Benefits

"Explore the power of event correlation in IT operations. Uncover hidden insights, detect issues, and enhance efficiency through meaningful event analysis. Learn more."
Security 3 Min Read

Open Cybersecurity Schema Framework (OCSF) Takes Flight with v1.0 Schema Release

The Open Cybersecurity Schema Framework (OCSF) celebrates its first anniversary with the launch of a new open data schema.
DevOps 5 Min Read

Modeling and Unifying DevOps Data

Embrace data models and bring order to the chaos as we break down elements and commonalities in various stages of the DevOps lifecycle starting with Work Planning.
Security 1 Min Read

BOTS at .conf23 Wrap Up and Worldwide BOTS Day!

After four hours, 56 New Wave songs, a make-your-own donut bar, and a ton of fun, BOTS v8 made its successful debut at .conf23