false
Drew Gibson

Drew Gibson

CIO Office 5 Min Read

Resilient Paths: How Women in Tech Navigate Challenges and Succeed

Through stories of perseverance, self-advocacy, and mentorship, explores how women in technology, particularly women of color, navigate challenges and break barriers to become influential leaders shaping the industry's future.
Learn 5 Min Read

ITOM vs. ITSM: IT Operations Management & IT Service Management

ITOM and ITSM both help your IT teams to better manage and deliver IT services to the business. What’s the difference? Get the full story here.
Security 4 Min Read

Staff Picks for Splunk Security Reading July 2024

Welcome to the Splunk staff picks blog, featuring a curated list of presentations, whitepapers, and customer case studies that our Splunk security experts feel are worth a read.
CISO Circle 3 Min Read

Embracing the Chaos: How Real Downtime Drills Build Resilient Organizations

Learn how chaos engineering builds resilient systems by simulating real downtime. Strengthen your organization's response to unexpected failures.
Learn 6 Min Read

Structured, Unstructured & Semi-Structured Data

An effective data management strategy is focused on the security, and transparency of structured, unstructured, and semi-structured data.
Learn 6 Min Read

Vulnerabilities, Threats & Risk Explained

Vulnerability, threat, risk: These terms are frequently used together, but they do explain three separate components of cybersecurity?
Tips & Tricks 4 Min Read

Convert Scheduled Dashboards to Dashboard Studio in Splunk Enterprise 9.3

Quickly and easily convert your scheduled Classic dashboards to Dashboard Studio for a superior export experience.
Security 6 Min Read

AcidPour Wiper Malware: Threat Analysis and Detections

The Splunk Threat Research Team provides an analysis of AcidPour and how to use Splunk’s out-of-the-box security content to help defend against this wiper malware.
Learn 6 Min Read

Audit Logging: A Comprehensive Guide

In this article, we’ll answer our simple question: How can you use audit logging, and what use cases do audit logs best support?