Hemant Seth's Blog Posts

Hemant is a Principal Product Manager at Splunk, leading the Kubernetes Monitoring offering within Splunk Observability Cloud. Prior to this role, he focused on Splunk Observability Platform administration, including identity management and license usage. Hemant brings over a decade of experience in the observability domain and holds a Master’s degree in Electrical Engineering with a specialization in Telecommunications.

Identifying BOD 23-02 Network Management Interfaces with Splunk
Security
2 Minute Read

Identifying BOD 23-02 Network Management Interfaces with Splunk

Splunker Drew Church explains the CISA-released directive to reduce risk from internet-exposed management interfaces, highlighting the threat of external remote services.
The Lessons Learned in Cybersecurity 25 Years Ago Are Still Applicable to AI Today
Security
4 Minute Read

The Lessons Learned in Cybersecurity 25 Years Ago Are Still Applicable to AI Today

Splunk's Paul Kurtz explores what we can learn from past events as AI accelerates the future.
The Principle of Least Privilege Explained (with Best Practices)
Learn
4 Minute Read

The Principle of Least Privilege Explained (with Best Practices)

Learn why implementing the Principle of Least Privilege is crucial for limiting cyber risks and preventing unauthorized data breaches.
Process vs. Practice: What's The Difference?
Learn
4 Minute Read

Process vs. Practice: What's The Difference?

Understand the roles of process and practice in achieving success, how to balance them for effective operations and how to promote continuous learning and adaptability.
.conf23: A DevOps/ ITOps and Observability's Guide to the Must-Attend Sessions
.conf & .conf Go
4 Minute Read

.conf23: A DevOps/ ITOps and Observability's Guide to the Must-Attend Sessions

Going to .conf23 but not sure which sessions to attend. Splunker Stephane Estevez took a closer look at the catalogue and highlights the ITOps and observability session that you absolutely cannot miss.
EDR, XDR & MDR: Which Detection & Response System Is Best?
Learn
4 Minute Read

EDR, XDR & MDR: Which Detection & Response System Is Best?

EDR, XDR, and MDR - what's the right solution for your organization? Discover the key differences and how they impact your cybersecurity strategy.