Splunk's Blog Posts

The world’s leading organizations trust Splunk to help keep their digital systems secure and reliable. Our software solutions and services help to prevent major issues, absorb shocks and accelerate transformation. Learn what Splunk does and why customers choose Splunk.

Celebrating the Resiliency of the AAPI Community
Splunk Life
3 Minute Read

Celebrating the Resiliency of the AAPI Community

To commemorate Asian American and Pacific Islander (AAPI) Heritage Month in the United States, we’re proudly celebrating the broader Asian and Pacific Islander (API) community both globally and here at Splunk.
Splunker Stories: Brenden Reeves
Splunk Life
3 Minute Read

Splunker Stories: Brenden Reeves

In our latest edition of our 'Splunker Stories' series, we meet our CNOC Manager, Brenden Reeves to learn more about the path which led him to Splunk, his global travel adventures, and how he embraces our core value of 'open' to encourage inclusiveness.
Splunk and Public Safety
Industries
6 Minute Read

Splunk and Public Safety

With the Splunk platform, public safety agencies can easily make sense of large volumes of data, from any source regardless of format, type, rate or volume, to gain real-time, enterprise-wide visibility, to make fast and confident decisions, and securely share intelligence across agencies enhancing collaboration, trust and program success.
Bringing Data to Every Part of Your Organization at SplunkLive! Virtual
.conf & .conf Go
1 Minute Read

Bringing Data to Every Part of Your Organization at SplunkLive! Virtual

SplunkLive! Virtual is coming soon, and Splunk's Lisa Palmer has all the details about what's in store for this year's event.
A Threat As Old As The Internet: Why We Still Care About Malware (And Why You Should Too)
Security
3 Minute Read

A Threat As Old As The Internet: Why We Still Care About Malware (And Why You Should Too)

Splunk's CISO Yassir Abousselham dives into why — as IT and security leaders — we need to come up with comprehensive strategies to specifically mitigate malware attacks.
TruSTAR Intel Workflows Series: Automating Data Workflows to Unlock Investments in SIEM, SOAR and XDR
Security
3 Minute Read

TruSTAR Intel Workflows Series: Automating Data Workflows to Unlock Investments in SIEM, SOAR and XDR

We recently introduced TruSTAR Intel Workflows.This blog series explains our motivations for building this feature, how it works, and how users can better inform security operations. This is Part 2: How TruSTAR Intel Workflows Work.