Skip to main content
false
Swatts

Stephen Watts

Stephen Watts works in growth marketing at Splunk. Stephen holds a degree in Philosophy from Auburn University and is an MSIS candidate at UC Denver. He contributes to a variety of publications including CIO.com, Search Engine Journal, ITSM.Tools, IT Chronicles, DZone, and CompTIA.

Learn 12 Min Read

What Is Predictive Modeling? An Introduction

Predictive modeling uses known results to create a statistical model that we can use to forecast future behaviors. Read on to learn more.
Learn 14 Min Read

What Is Incident Response?

In this post, we'll cover what incident response is and why it's essential for organizations to protect themselves from digital threats.
Learn 14 Min Read

What Is Root Cause Analysis? The Complete RCA Guide

In this article, we'll explore how to conduct RCA, its core principles, best practices, and the tools available to facilitate this process.
Learn 15 Min Read

What Is Network Configuration?

In this post, we'll do a deep dive into network configuration and include best practices for keeping networks up and running
Learn 5 Min Read

What is Digital Experience Monitoring?

Analyze the performance of enterprise digital applications and services while ensuring a seamless customer experience through digital experience monitoring (DEM).
Learn 8 Min Read

What Is Anomaly Detection? Examples, Techniques & Solutions

Interest in anomaly detection is on the rise everywhere. Anomaly detection is really about understanding our data and what we expect from "normal" behavior. Learn more here.
Learn 9 Min Read

The Best Security Conferences & Events 2024

Ready for in-person security conferences and events? Check out this roundup of 2024 security conferences, covering cybersecurity, InfoSec, SecOps and more.
Learn 12 Min Read

What Is Cybersecurity? The Ultimate Guide

Learn about cybersecurity and its importance. Take a look at various kinds of cyber threats, risks, and tools and frameworks to mitigate them.
Learn 5 Min Read

The CISO Role: What Does a Chief Information Security Officer Do?

Understand the vital role of CISO, including responsibilities, skills and experience, reporting & hierarchy, salary ranges, and more.
Learn 10 Min Read

The CVE & CVE Management, Explained

The CVE is a go-to public list of vulnerabilities and exposures that threat actors can harness. Get the full story for managing CVEs here.
Learn 5 Min Read

Splunk Product Reviews & Ratings - Enterprise, Cloud & ES

Splunk delivers AI-powered solutions for digital resilience. Explore Splunk Enterprise, Splunk Cloud, and Splunk Enterprise Security for advanced analytics and cybersecurity.
Learn 4 Min Read

Splunk Tutorial: Getting Started Using Splunk

Whether you are new to Splunk or just needing a refresh, this post can guide you to some of the best resources on the web for using Splunk.
Learn 8 Min Read

What is AIOps? AIOps Explained

In this blog post, we'll take a look at AIOps and how it is transforming IT Operations functions in the Enterprise.
Learn 10 Min Read

Blockchain & Crypto Conferences 2024: The Complete Guide

Whether you are looking for a small regional meetup or an enormous global summit, we’ve compiled the complete 2024 guide to Blockchain & crypto conferences that is sure to have the right event for you!
Learn 2 Min Read

RSA Conference 2024: Your Complete Guide

This blog post is the complete guide to the 2024 RSA conference.
Learn 4 Min Read

Google Cloud Next 2024: Complete Guide

This blog post will cover the complete details around Google Cloud Next 2024, the upcoming conference in Las Vegas.
Learn 6 Min Read

DevOps Conferences & Events 2024: Complete Guide

Check out this article to explore the most popular DevOps conferences and events for 2024 around the world! Add your event, too, by getting in touch with us.
Learn 6 Min Read

Google Dorking: An Introduction for Cybersecurity Professionals

In this blog post, we'll take a look at the basics of Google Dorking (AKA Google Hacking), how it can impact your organization, and steps you can take to mitigate this risk.
Learn 2 Min Read

RED Monitoring: Rate, Errors, and Duration

In this blog post, we'll take a brief look at the RED monitoring framework, its benefits, and how it is used in the modern digital enterprise.
Learn 4 Min Read

Machine Customers: A Brief Introduction

In this blog post, we'll take a look at the future of machine customers and they impact they could hold.
Learn 7 Min Read

Metrics to Monitor for AWS (ELB) Elastic Load Balancing

In this blog post, we'll take a look at metrics to monitor for AWS Elastic Load Balancing.
Learn 5 Min Read

What is Cardinality? Cardinality Metrics for Monitoring and Observability

In this blog post we’ll define cardinality and high cardinality, and explore the role of cardinality in monitoring and observability.
Learn 16 Min Read

Splunk Cheat Sheet: Query, SPL, RegEx, & Commands

In this blog post we'll cover the basics Queries, Commands, RegEx, SPL, and more for using Splunk Cloud and Splunk Enterprise
Learn 3 Min Read

Dogfooding: AKA drinking your own champagne, or eating your own ice cream

In this blog post we'll take a quick look at the history, benefits, challenges, and language of dogfooding.