Kushagra Sharma's Blog Posts

Kushagra Sharma

Kushagra Sharma is a Product Manager at Cisco working on AIOps products that help teams operate complex systems with intelligence and scale. He focuses on translating customer problems into practical, data-driven solutions at the intersection of AI, reliability, and software platforms. Passionate about clear thinking and strong product craft, Kushagra writes to share insights on technology, product strategy, and building systems that actually work in the real world.

LLM Observability Explained: Prevent Hallucinations, Manage Drift, Control Costs
Learn
7 Minute Read

LLM Observability Explained: Prevent Hallucinations, Manage Drift, Control Costs

LLM observability is critical for scaling AI systems. Learn how proper tracking helps to cut costs, prevent hallucinations, and build trustworthy LLM apps.
What Is Network Monitoring? Ensuring Uptime, Security & Operational Excellence
Learn
8 Minute Read

What Is Network Monitoring? Ensuring Uptime, Security & Operational Excellence

Network monitoring means overseeing a network's performance, availability, and overall functionality — allowing you to identify and resolve issues before they impact end-users.
Now Offering the AI Assistant Usage Dashboard in Cloud Monitoring Console
Artificial Intelligence
2 Minute Read

Now Offering the AI Assistant Usage Dashboard in Cloud Monitoring Console

Discover the AI assistant usage dashboard in Cloud Monitoring Console and how Splunk Admins can use it to optimize their AI usage within Splunk.
The Real Cost of Disjointed Security Tools in the SOC
Ciso Circle
3 Minute Read

The Real Cost of Disjointed Security Tools in the SOC

Overcome data gravity by activating the right data, not just accumulating it. Learn how to boost digital resilience, optimize hybrid cloud, and leverage AI effectively.
Community at .conf25: SplunkTrust Stories Series (Part 4)
.conf & .conf Go
2 Minute Read

Community at .conf25: SplunkTrust Stories Series (Part 4)

For SplunkTrust members like Michael Bentley, .conf isn't just another technology conference – it's become something far more personal.
Modern C2 Attacks: Detect & Defend Command-and-Control
Learn
7 Minute Read

Modern C2 Attacks: Detect & Defend Command-and-Control

Learn how command-and-control (C2) attacks work, including emerging stealth techniques, real-world examples, and modern detection using AI and behavioral analysis.