false
Learn Blogs

Latest Articles

Learn 3 Min Read

Honeypots Explained: Hitting Hackers Where It Hurts

Entice hackers to your system to gather cyberthreat intelligence. Get the latest on honeypot types and interactions and see why it isn’t all so sweet.
Learn 3 Min Read

Advanced Encryption Standard & AES Rijndael Explained

Learn all about AES Rijndael, today's go-to algorithm that won a NIST competition for ensuring data confidentiality — and it does much more than that!
Learn 1 Min Read

Network Security Monitoring (NSM) Explained

Network security monitoring sounds like other security measures like intrusion detection. Find out why it's not — and what makes it so useful for IT today.
Learn 4 Min Read

Cybercrime as a Service (CaaS) Explained

Perhaps unsurprisingly, cybercrime is now available for hire. Harnessing the ‘as a service’ model, find out how cybercrime can be enacted by practically anyone.
Learn 6 Min Read

Cryptography 101: Key Principles, Major Types, Use Cases & Algorithms

Cryptography underpins so many digital interactions — you might not even realize it. Get the full story on cryptography, use cases and emerging types.
Learn 6 Min Read

Cybersecurity Risk Management: 5 Steps for Assessing Risk

Don’t just guess your risk profile — assess it! Learn about cybersecurity risk management and apply these 5 steps to turn the process into an ongoing practice.
Learn 3 Min Read

Corporate Espionage: What You Need To Know

Cyber threats are not only anonymous. Find out why people you know, and perhaps partner with, are spying on you — and whether it’s corporate espionage.
Learn 4 Min Read

Denial-of-Service Attacks: History, Techniques & Prevention

DoS attacks have a long history, but they’re also predicted to get worse in 2023. Find out the many ways they work and learn to prevent them in the first place.
Learn 4 Min Read

Encryption Explained: At Rest, In Transit & End-To-End Encryption

Humans have encrypted messages for millennia. Today it’s essentially part of daily life. Understand how it works — and decide if you need end-to-end encryption.
Learn 5 Min Read

Using Splunk for SEO Log File Analysis

This blog post will showcase just a few of the ways we’re using Splunk to improve our own technical SEO.
Learn 7 Min Read

What is DevOps Automation?

Automation is essential to DevOps — but it’s not easy. This guide details how to automate DevOps and the best tools for the job so you can succeed in no time!
Learn 4 Min Read

CMDBs Explained: Configuration Management Databases

Meant to provide visibility into all IT assets, CMDBs are routinely underutilized. Learn how to plan, implement and maintain a CMDB to maximize business value.
Learn 6 Min Read

What is ETL?

Strengthen your data foundation by knowing ETL. Short for Extract, Transform, Load, the ETL process is vital for turning all that data into business value.
Learn 4 Min Read

What is Ethical Hacking?

Ethical hacking is one way to understand vulnerabilities within your system. Learn how to hack ethically, get trained and see how hacking supports security.
Learn 3 Min Read

Logs vs Metrics: Pros, Cons & When to Use Which

In the metrics vs logs debate, we come down firmly in the “use both, smartly” camp. See how logs and metrics create a complementary observability foundation.
Learn 1 Min Read

Splunk MINT: A Complete Introduction

Looking for Splunk MINT? This blog post explains in detail what Splunk MINT was, what happened to Splunk MINT, and much more.
Learn 2 Min Read

Splunk Light: An Introduction and Beginner's Guide

Looking for Splunk Light? This blog post explains in detail what Splunk Light was, what happened to Splunk Light, and much more.
Learn 4 Min Read

Splunk Universal Forwarder

In this blog post you can learn about Splunk Universal Forwarders - what they are, why to use them, how they work, and resources to get started.
Learn 4 Min Read

Is Blockchain Dead? No. Is Web3 Dead? Maybe.

This blog post explores trends around Web3, Blockchain, NFTs, Cryptocurrency, and related technologies.
Learn 7 Min Read

What is Cloud-Native Security? An Introduction

Understand how cloud native security can protect your organization's data and applications in the cloud. Explore the 4Cs and 3Rs principles plus get common strategies.
Learn 11 Min Read

Security Books & Articles: Must-Read List From InfoSec Experts

Looking for your next read? Our security experts picked the very best security books, guides & articles. From hobbyists to pros, we’ve got books for you!