false
Drew Gibson

Drew Gibson

Learn 7 Min Read

What Is a Watering Hole Attack? Detection and Prevention

A watering hole attack is a kind of cyberattack, where hackers target websites that are frequently browsed by their target victims.
Learn 10 Min Read

SRE Metrics: Core SRE Components, the Four Golden Signals & SRE KPIs

Get the full story on SRE metrics, including latency, errors, saturation, and traffic, so you can better assess your system's reliability, performance, and efficiency.
Learn 8 Min Read

Key Management in Cryptography: A Complete Introduction

Today, we'll cover encryption key management including a definition and the establishment processes for private & public key cryptography.
CISO Circle 4 Min Read

Trust but Verify: Ensuring Accountability with Security Vendors

Who’s held responsible when a breach goes down?

Splunk’s AI Assistant: Top 7 Use Cases for AI-Driven Observability

Discover how Splunk’s AI Assistant transforms observability with AI-driven insights. Learn 7 powerful use cases to enhance performance and incident response.
Observability 5 Min Read

Customers Increasingly Choose Splunk for Observability

In this blog post, learn what makes Splunk Observability different from other industry solutions like New Relic.
Learn 7 Min Read

What Is Machine Data? A Complete Intro To Machine Data, For Humans

In this post, we'll discuss what machine data is, how it’s used, common examples of machine data, and why it’s important.
Security 5 Min Read

Onboarding Windows Events to Powershell Threat Detection in UBA

Learn how to enhance PowerShell threat detection in UBA by effectively onboarding Windows events. Our step-by-step guide covers XML event log formats and Splunk integration, ensuring robust security against cyber threats.
Learn 8 Min Read

What Is a Data Platform? A Complete Introduction

Let’s take a deep look at data platforms, including the definition, the benefits and use cases, and how to start building your data strategy.