false
Drew Gibson

Drew Gibson

Security 16 Min Read

Behind the Curtain: Detecting Remote Employment Fraud Inside Your Organization

Detect Remote Employment Fraud using Splunk Enterprise Security with actionable detection strategies to identify and respond to fraudulent activity.
Security 1 Min Read

Splunk Named a Leader in The Forrester Wave™: Security Analytics Platforms, Q2 2025

Splunk has been named a Leader in The Forrester Wave: Security Analytics Platforms, Q2 2025.
Security 7 Min Read

Defending at Machine Speed: Guiding LLMs with Security Context

Enhance LLM performance for cybersecurity tasks with few-shot learning, RAG, & fine-tuning guide models for accurate PowerShell classification.
Security 1 Min Read

Splunk Security Content for Threat Detection & Response: May Recap

There are 13 new analytics and 4 new analytic stories now available in Splunk Enterprise Security via the ESCU application update process.

Using Splunk to Monitor the Security of MCP Servers

Learn how to use Splunk to monitor MCP Server security.
Learn 4 Min Read

Deep Packet Inspection (DPI) Explained: OSI Layers, Real-World Applications & Ethical Considerations

Explore Deep Packet Inspection (DPI): how it boosts security & network ops, its applications, and the crucial privacy vs. security debate.
.conf & .conf Go 3 Min Read

Building the Future: Splunk Developer Sessions You Can't Miss at .conf25

Join us at .conf25 for an amazing lineup of sessions, activities, and expert staff covering best practices that are tailored to elevate your Splunk development game.
CISO Circle 6 Min Read

Beyond the Music: Lessons from Spotify's Fleet Management Journey

Learn how Spotify leverages standardized tooling, automated pipelines, and organizational alignment to transform challenges into opportunities for innovation.
Learn 8 Min Read

Advanced Persistent Threats (APTs): What They Are and How to Defend Against Them

Learn about Advanced Persistent Threats (APTs): their stages, characteristics, real-world examples like Operation Aurora, and strategies to protect your organization.