Hemant Seth's Blog Posts

Hemant is a Principal Product Manager at Splunk, leading the Kubernetes Monitoring offering within Splunk Observability Cloud. Prior to this role, he focused on Splunk Observability Platform administration, including identity management and license usage. Hemant brings over a decade of experience in the observability domain and holds a Master’s degree in Electrical Engineering with a specialization in Telecommunications.

A Global Day of Service: Building Community Resilience Drives Social Impact
Splunk Life
2 Minute Read

A Global Day of Service: Building Community Resilience Drives Social Impact

On Friday, March 17, 2023, the Black Employees Achieve More at Splunk (BEAMS) and Womxn+ Employee Resource Groups (ERGs) partnered to host Splunk’s first-ever Global Day of Service.
Data Denormalization: The Complete Guide
Learn
6 Minute Read

Data Denormalization: The Complete Guide

To normalize or not normalize your data. Decide here, as we explain why you’d denormalize data (faster query times!) but also the reasons to avoid it.
AsyncRAT Crusade: Detections and Defense
Security
9 Minute Read

AsyncRAT Crusade: Detections and Defense

The Splunk Threat Research Team explores detections and defense against the Microsoft OneNote AsyncRAT malware campaign.
My Username Fields Have Passwords in Them! What Do I Do?
Security
3 Minute Read

My Username Fields Have Passwords in Them! What Do I Do?

Sometimes, users put their password into a username field and it gets logged into Splunk – learn how to identify this behavior and remediate it with SOAR.
What is Federated Search?
Learn
4 Minute Read

What is Federated Search?

Searching isn’t as easy as you think: did Google get your request? Are you pinging multiple databases? Is ChatGPT involved? Learn all about federated search here.
Breaking the Chain: Defending Against Certificate Services Abuse
Security
11 Minute Read

Breaking the Chain: Defending Against Certificate Services Abuse

Explore the common certificate abuses leveraged by current and relevant adversaries in the wild, the multiple methods they use to obtain certificates, how to gather relevant logs and ways to mitigate adversaries stealing certificates.