false
Drew Gibson

Drew Gibson

Learn 8 Min Read

What is Network Segmentation? A Complete Guide

Learn how network segmentation enhances security, boosts network performance, and protects critical assets by isolating subnets and limiting cyber threats.
CISO Circle 8 Min Read

Ciso Q&A: Walking the Risk Tightrope to Drive Innovation

Understanding the evolution of threats as generative AI ups the stakes for defenders
Security 10 Min Read

Cracking Braodo Stealer: Analyzing Python Malware and Its Obfuscated Loader

The Splunk Threat Research Team break down Braodo Stealer's loader mechanisms, obfuscation strategies, and payload behavior.
Industries 5 Min Read

Splunk’s Path Towards Achieving FedRAMP Moderate Authorization for Splunk Observability

Splunk VP of Public Sector Bill Rowan shares how we plan on actively pursuing a FedRAMP Moderate authorized Splunk Observability Cloud offering.
CTO Stack 3 Min Read

Ensuring Downtime Is Low When the Stakes Are High During Black Friday

How to minimize IT challenges and delight customers during user surges
Security 4 Min Read

Paving the Way for Unified Cybersecurity: OCSF Joins the Linux Foundation with Splunk’s Support

Unified cybersecurity takes a step forward as OCSF joins the Linux Foundation, backed by Splunk’s support.
Security 1 Min Read

Splunk Enterprise Security 8.0: Customer Feedback

Splunk Enterprise Security 8.0 delivers unified workflows, alert aggregation, and detection versioning to empower security teams, shaped by customer feedback.
Learn 12 Min Read

AppSec Today: Application Security Requirements & Guidelines To Know

Explore the essential aspects of application security: threats, requirements, and best practices. Learn how to safeguard your applications and data effectively.
Learn 4 Min Read

Recovery Point Objective (RPO) vs. Recovery Time Objective (RTO): What’s The Difference?

For online services and products, availability is the name of the game. Learn what RPO and RTO mean for availability — and how to set them for your organization.