Hemant Seth's Blog Posts

Hemant is a Principal Product Manager at Splunk, leading the Kubernetes Monitoring offering within Splunk Observability Cloud. Prior to this role, he focused on Splunk Observability Platform administration, including identity management and license usage. Hemant brings over a decade of experience in the observability domain and holds a Master’s degree in Electrical Engineering with a specialization in Telecommunications.

Top 10 AI Trends 2025: How Agentic AI and MCP Changed IT
Artificial Intelligence
5 Minute Read

Top 10 AI Trends 2025: How Agentic AI and MCP Changed IT

Explore the top 10 AI trends of 2025—from agentic AI and Model Context Protocol (MCP) to self-healing systems—and see what to expect for AI in 2026.
Swiss Army LLMs Won’t Protect You. Purpose-Built Cybersecurity AI Will.
Ciso Circle
8 Minute Read

Swiss Army LLMs Won’t Protect You. Purpose-Built Cybersecurity AI Will.

Discover why purpose-built cybersecurity AI outperforms generalist LLMs for security tasks. Learn how specialized models deliver precision, compliance, and real-time protection.
What Is OPSEC? Operations Security and How It Works
Learn
4 Minute Read

What Is OPSEC? Operations Security and How It Works

Operations security (OPSEC) helps organizations prevent adversaries from gaining actionable insight by protecting sensitive operational information across systems and processes.
TOTAL-REPLAY: The Bridge to Replay Attacks Using the Security Content Metadata
Security
5 Minute Read

TOTAL-REPLAY: The Bridge to Replay Attacks Using the Security Content Metadata

Learn how to use TOTAL-REPLAY to replay Splunk Attack Data logs. Validate detections, tune analytics, and map to MITRE ATT&CK without a full attack lab.
Print, Leak, Repeat: UEBA Insider Threats You Can't Ignore
Security
5 Minute Read

Print, Leak, Repeat: UEBA Insider Threats You Can't Ignore

UEBA excels at identifying small deviations in user and device behavior across authentication, data access, data movement, and privilege usage.
Splunking Isovalent Data: Initial Setup and Overview
Security
5 Minute Read

Splunking Isovalent Data: Initial Setup and Overview

The Splunk Threat Research Team walks through the lab setup, Splunk data ingestion, and initial exploration of Tetragon logs to establish our foundation.