Stephen Watts's Blog Posts
Stephen Watts works in growth marketing at Splunk. Stephen holds a degree in Philosophy from Auburn University and is an MSIS candidate at UC Denver. He contributes to a variety of publications including CIO.com, Search Engine Journal, ITSM.Tools, IT Chronicles, DZone, and CompTIA.
Display Mode
Paginated
Filter
Author
Author URL
Limit
6

What Is Network Configuration?
In this post, we'll do a deep dive into network configuration and include best practices for keeping networks up and running

What is Digital Experience Monitoring?
Analyze the performance of enterprise digital applications and services while ensuring a seamless customer experience through digital experience monitoring (DEM).

What Is Anomaly Detection? Examples, Techniques & Solutions
Interest in anomaly detection is on the rise everywhere. Anomaly detection is really about understanding our data and what we expect from "normal" behavior. Learn more here.

The CISO Role: What Does a Chief Information Security Officer Do?
Understand the vital role of CISO, including responsibilities, skills and experience, reporting & hierarchy, salary ranges, and more.

The CVE & CVE Management, Explained
The CVE is a go-to public list of vulnerabilities and exposures that threat actors can harness. Get the full story for managing CVEs here.

Splunk Product Reviews & Ratings - Enterprise, Cloud & ES
Splunk delivers AI-powered solutions for digital resilience. Explore Splunk Enterprise, Splunk Cloud, and Splunk Enterprise Security for advanced analytics and cybersecurity.