false
Watch the .conf25 Global Broadcast on demand
Watch the .conf25 Global Broadcast on demand
Learn Blogs

Latest Articles

Learn 6 Min Read

Cybersecurity Risk Management: 5 Steps for Assessing Risk

Don’t just guess your risk profile — assess it! Learn about cybersecurity risk management and apply these 5 steps to turn the process into an ongoing practice.
Learn 3 Min Read

Corporate Espionage: What You Need To Know

Cyber threats are not only anonymous. Find out why people you know, and perhaps partner with, are spying on you — and whether it’s corporate espionage.
Learn 4 Min Read

Denial-of-Service Attacks: History, Techniques & Prevention

DoS attacks have a long history, but they’re also predicted to get worse in 2023. Find out the many ways they work and learn to prevent them in the first place.
Learn 4 Min Read

Encryption Explained: At Rest, In Transit & End-To-End Encryption

Humans have encrypted messages for millennia. Today it’s essentially part of daily life. Understand how it works — and decide if you need end-to-end encryption.
Learn 5 Min Read

Using Splunk for SEO Log File Analysis

This blog post will showcase just a few of the ways we’re using Splunk to improve our own technical SEO.
Learn 7 Min Read

What is DevOps Automation?

Automation is essential to DevOps — but it’s not easy. This guide details how to automate DevOps and the best tools for the job so you can succeed in no time!
Learn 4 Min Read

CMDBs Explained: Configuration Management Databases

Meant to provide visibility into all IT assets, CMDBs are routinely underutilized. Learn how to plan, implement and maintain a CMDB to maximize business value.
Learn 6 Min Read

What is ETL?

Strengthen your data foundation by knowing ETL. Short for Extract, Transform, Load, the ETL process is vital for turning all that data into business value.
Learn 4 Min Read

What is Ethical Hacking?

Ethical hacking is one way to understand vulnerabilities within your system. Learn how to hack ethically, get trained and see how hacking supports security.
Learn 3 Min Read

Logs vs Metrics: Pros, Cons & When to Use Which

In the metrics vs logs debate, we come down firmly in the “use both, smartly” camp. See how logs and metrics create a complementary observability foundation.
Learn 1 Min Read

Splunk MINT: A Complete Introduction

Looking for Splunk MINT? This blog post explains in detail what Splunk MINT was, what happened to Splunk MINT, and much more.
Learn 2 Min Read

Splunk Light: An Introduction and Beginner's Guide

Looking for Splunk Light? This blog post explains in detail what Splunk Light was, what happened to Splunk Light, and much more.
Learn 4 Min Read

Splunk Universal Forwarder

In this blog post you can learn about Splunk Universal Forwarders - what they are, why to use them, how they work, and resources to get started.
Learn 4 Min Read

Is Blockchain Dead? No. Is Web3 Dead? Maybe.

This blog post explores trends around Web3, Blockchain, NFTs, Cryptocurrency, and related technologies.
Learn 11 Min Read

Security Books & Articles: Must-Read List From InfoSec Experts

Looking for your next read? Our security experts picked the very best security books, guides & articles. From hobbyists to pros, we’ve got books for you!
Learn 5 Min Read

Incident Severity Levels 1-5 Explained

Incident severity levels indicate how an incident impacts your customers, so you can prioritize and respond appropriately. Learn how to define and use them.
Learn 4 Min Read

Cloud Network Monitoring: An Introduction

Network monitoring vs cloud monitoring: do you really need both? Find out why cloud network monitoring is the key to business success in this article.
Learn 5 Min Read

The Democratization of Data: The Pros & Cons of All That Data

Data democratization means that more people have access to data than ever before. Is this good, bad or complicated? Explore the pros and cons of all this data.
Learn 5 Min Read

Trunk-Based Development vs. GitFlow: Which Source Code Control is Right for You?

Understand trunk-based development and GitFlow, two source code management approaches, so you can decide which is right for your developer environment.
Learn 5 Min Read

What Is TBD? Trunk-Based Development & Its Role in CI/CD

Trunk-based development is a popular way to control source code when developing apps. Learn how TBD works, how it supports CI/CD, and when to avoid it.
Learn 5 Min Read

Status Pages: The Ultimate Guide

Status pages show real-time status of applications and services. See how these best practices make status pages succeed — and why that’s crucial for business.