Skip to main content
false
Leadership
6 min read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

.conf24

.conf & .conf Go
2 min read
Invest in your professional development and take your Splunk expertise to new heights with Splunk University and .conf24.
.conf & .conf Go 2 Min Read

Get Ready for .conf24: A Can’t-Miss For Security Professionals

Splunker Dane Disimino dives into what makes .conf24 an essential gathering for security experts.
.conf & .conf Go 3 Min Read

Explore All the Splunk Platform Has To Offer at .conf24!

Splunker Anna Mensing highlights the top Splunk Platform sessions at .conf24 and why they are not to be missed.
.conf & .conf Go 3 Min Read

.conf24 Global Broadcast: The Complete Guide

Curious about the .conf Global Broadcast from Splunk? Check out this article for all the details, answers, and excitement about what to expect.
.conf & .conf Go 1 Min Read

The Splunkie Awards Open Nominations for 2024

The Splunkie Awards are back and more exciting than ever because for the first time this year, we’re bringing the Global Partner Awards to the Splunkies at .conf24.

Learn

Latest Articles

Learn 6 Min Read

What Is a Bot? Common Bot Types

Embrace the good bots, beware the bad bots. Discover the roles, benefits, and threats of bots across the web. Stay informed, stay safe.
Platform 3 Min Read

Fastest Time-to-Value Anomaly Detection in Splunk: The Splunk App for Anomaly Detection 1.1.0

Splunk App for Anomaly Detection simplifies ML, making anomaly detection easy. It streamlines tasks, enabling ML integration in everyday workflows. Just load data, select the field, and click "Detect Anomalies."
Platform 3 Min Read

Swimming in Sensors and Drowning in Data: The Role of Splunk Partners in Delivering Splunk Edge Hub

With the proliferation of edge computing and the release of Splunk Edge Hub, partners have additional functionality to accelerate the detection, investigation and response of threats and issues that will inevitably occur in physical and industrial environments.
Security 8 Min Read

Amadey Threat Analysis and Detections

The Splunk Threat Research Team shares a deep-dive analysis of the Amadey Trojan Stealer, an active and prominent malware that first emerged on the cybersecurity landscape in 2018 and has maintained a persistent botnet infrastructure ever since.
IT 8 Min Read

Building an 'AI Assistant' for Splunk

Thanks to early adoption and continuous product improvement, we were able to improve the SPL Copilot for Splunk to provide a much richer and guided experience to Splunk and SPL and renamed it 'Splunk AI Assistant.'
Learn 5 Min Read

Inclusive Language In the Workplace: Why It Matters & How To Achieve It

Effective communication forms the foundation for an effective workplace. Creating an inclusive work environment has become a necessity for organizations that are striving for success, growth, and innovation.
Learn 6 Min Read

Technical Support Engineer Role Explored: Responsibilities, Skills and Salary

Discover the world of technical support engineering! Learn about responsibilities, required skills, certifications, and salary insights for this in-demand career path
Learn 8 Min Read

Data Lifecycle Management: A Complete Guide

Learn data lifecycle management (DLM) to effectively manage data throughout its lifecycle, from creation to deletion, ensuring security and compliance.
Learn 5 Min Read

Product Manager Role Explained: Responsibilities, Skills, and Salaries

Discover the key role of product managers in successful product development. Learn about their responsibilities, essential skills, and expected salary.