/en_us/blog/partners/splunk-accelerates-agentic-ai-innovation-at-cisco-live-amsterdam

Splunk Blogs

Artificial Intelligence

Learn

Latest Articles

When AI Tools Turn Against You: Operationalizing MCP Server Security with the Splunk MCP TA
Security
4 Minute Read

When AI Tools Turn Against You: Operationalizing MCP Server Security with the Splunk MCP TA

Learn how to secure Model Context Protocol (MCP) servers using the Splunk MCP TA.
AIOps Explained: Detection, Prediction, and Mitigation in IT Operations
Learn
5 Minute Read

AIOps Explained: Detection, Prediction, and Mitigation in IT Operations

AIOps applies machine learning to logs, metrics, and events to reduce alert noise, predict failures, and improve IT operations at scale.
Preemptive Cybersecurity in 2026: How It Works
Learn
4 Minute Read

Preemptive Cybersecurity in 2026: How It Works

Stop cyberattacks before they gain a foothold. Discover how preemptive cybersecurity uses the "3 D's"—Deny, Deceive, and Disrupt—to neutralize AI-driven threats.
Swiss Army LLMs Won’t Protect You. Purpose-Built Cybersecurity AI Will.
Ciso Circle
8 Minute Read

Swiss Army LLMs Won’t Protect You. Purpose-Built Cybersecurity AI Will.

Discover why purpose-built cybersecurity AI outperforms generalist LLMs for security tasks. Learn how specialized models deliver precision, compliance, and real-time protection.
What Is OPSEC? Operations Security and How It Works
Learn
4 Minute Read

What Is OPSEC? Operations Security and How It Works

Operations security (OPSEC) helps organizations prevent adversaries from gaining actionable insight by protecting sensitive operational information across systems and processes.
Service Level Management & Monitoring
Learn
6 Minute Read

Service Level Management & Monitoring

Service level management practice helps to set and manage a shared view of the quality of services between the service provider and the service consumer.
TOTAL-REPLAY: The Bridge to Replay Attacks Using the Security Content Metadata
Security
5 Minute Read

TOTAL-REPLAY: The Bridge to Replay Attacks Using the Security Content Metadata

Learn how to use TOTAL-REPLAY to replay Splunk Attack Data logs. Validate detections, tune analytics, and map to MITRE ATT&CK without a full attack lab.
Print, Leak, Repeat: UEBA Insider Threats You Can't Ignore
Security
5 Minute Read

Print, Leak, Repeat: UEBA Insider Threats You Can't Ignore

UEBA excels at identifying small deviations in user and device behavior across authentication, data access, data movement, and privilege usage.
Splunking Isovalent Data: Initial Setup and Overview
Security
5 Minute Read

Splunking Isovalent Data: Initial Setup and Overview

The Splunk Threat Research Team walks through the lab setup, Splunk data ingestion, and initial exploration of Tetragon logs to establish our foundation.