Chrissy Kidd is a technology writer, editor and speaker. Part of Splunk’s growth marketing team, Chrissy translates technical concepts to a broad audience. She’s particularly interested in the ways technology intersects with our daily lives.
Breaking news: Log data can provide a ton of value, if you know how to do it right. Read on to get everything you need to know to maximize value from logs.
Searching isn’t as easy as you think: did Google get your request? Are you pinging multiple databases? Is ChatGPT involved? Learn all about federated search here.
Don’t be confused, be creative. Observability is a lot more than mere monitoring. In fact, the possibilities are practically endless. Find out more here.
Every 19 seconds a ransomware attack launches. Are these standalone attacks? Are they operating within a ransomware family of shared knowledge? Find out here.
The CIA Triad is a security fundamental, but is it outdated? See what experts have to say about confidentiality, integrity & availability in this article.
Data encryption is one way to protect sensitive information. Our beginner guide details how encrypting data works: methods, types, algorithms & best practices.
A cyber kill chain framework can help organizations to better understand and combat attacks. Learn about the evolution and applications of the cyber kill chain.
Learn about DevOps monitoring, including the key practices, principles and tools required that help to support and improve the software development lifecycle.
Kickstart or enhance your security strategy with a cybersecurity framework. See the best frameworks and understand which are right for your organization.
Incident severity levels indicate how an incident impacts your customers, so you can prioritize and respond appropriately. Learn how to define and use them.
Vulnerability, threat and risk are three fundamental concepts in cybersecurity. Learn from industry experts how they differ and play out in IT environments.
Data democratization means that more people have access to data than ever before. Is this good, bad or complicated? Explore the pros and cons of all this data.