Hemant Seth's Blog Posts

Hemant Seth

Hemant is a Principal Product Manager at Splunk, leading the Kubernetes Monitoring offering within Splunk Observability Cloud. Prior to this role, he focused on Splunk Observability Platform administration, including identity management and license usage. Hemant brings over a decade of experience in the observability domain and holds a Master’s degree in Electrical Engineering with a specialization in Telecommunications.

Cloud Automation Explained
Learn
7 Minute Read

Cloud Automation Explained

Cloud automation streamlines cloud management by automating deployment, scaling, and maintenance. Learn its benefits, challenges, and best practices.
How Supply Chain Attacks Work: Definition, Types, Security and Prevention
Learn
8 Minute Read

How Supply Chain Attacks Work: Definition, Types, Security and Prevention

Supply chain attacks exploit trusted third parties and vendors to gain access to compromise the supply chain. Read on to learn more.
AI’s Potential is Limitless, But Are You Prepared for the Risks?
Cto Stack
4 Minute Read

AI’s Potential is Limitless, But Are You Prepared for the Risks?

AI isn't a magic fix. Discover when AI makes sense, when it doesn’t, and how to build a smart, secure strategy before you invest.
Powering Digital Resilience in the AI Era
Artificial Intelligence
3 Minute Read

Powering Digital Resilience in the AI Era

With rapid advancements in AI, digital resilience is no longer optional – that's why leading organizations trust Splunk’s unified security and observability platform to keep their digital systems secure and reliable.
Top 12 KPIs To Know & Use: Key Performance Indicators Explained
Learn
8 Minute Read

Top 12 KPIs To Know & Use: Key Performance Indicators Explained

Measuring business operations is critical, but are you measuring the right stuff? Check out these 12 indicator types to inform what you’re measuring.
What Is a MITM Attack? Man in the Middle Attacks, Explained
Learn
6 Minute Read

What Is a MITM Attack? Man in the Middle Attacks, Explained

In this post, we'll discuss Man in the Middle attack including what a MITM attack is, how it works, and ways to keep your data safe.