/en_us/blog/ciso-circle/ciso-ai-strategy-digital-resilience

Splunk Blogs

Artificial Intelligence

Learn

Latest Articles

Driving Innovation at KubeCon EU 2026: Splunk’s Latest Observability Advancements
Observability
2 Minute Read

Driving Innovation at KubeCon EU 2026: Splunk’s Latest Observability Advancements

Discover the latest Splunk observability innovations at KubeCon EU 2026, including OpenTelemetry eBPF instrumentation, OTLP log ingestion, and Kubernetes monitoring.
What Is Detection Engineering? A Complete Guide to Modern Threat Detection
Learn
5 Minute Read

What Is Detection Engineering? A Complete Guide to Modern Threat Detection

Learn how detection engineering transforms telemetry into actionable alerts to reduce dwell time and proactively identify advanced cyber threats.
Why Your Machine Data Strategy Is Your AI Strategy
Artificial Intelligence
7 Minute Read

Why Your Machine Data Strategy Is Your AI Strategy

Cisco Data Fabric unifies your data and AI strategies with federated search, AI-native capabilities, and agentic AI to transform machine data into actionable intelligence.
How Can CISOs Reduce Risk? Become a Legal Expert
Ciso Circle
5 Minute Read

How Can CISOs Reduce Risk? Become a Legal Expert

Navigate the evolving landscape of CISO liability. Gain actionable insights on building proactive, evidence-based security processes that withstand executive and regulatory scrutiny.
How Artificial Intelligence Is Redefining Human Intelligence
Artificial Intelligence
10 Minute Read

How Artificial Intelligence Is Redefining Human Intelligence

AI is automating IT operations and breaking down silos, while elevating human roles in judgment, context, and strategy. The future is human and AI partnership.
From Data Chaos to Results: The New Data Strategy for the Agentic Era
Leadership
7 Minute Read

From Data Chaos to Results: The New Data Strategy for the Agentic Era

We're shifting from the AI era to the Agentic AI era – a stage where AI systems are increasingly able to autonomously carry out complex tasks, working in collaboration with humans.
Why Honeypots Work: The Case for Letting Attackers In
Learn
3 Minute Read

Why Honeypots Work: The Case for Letting Attackers In

Honeypots act as decoy systems to lure attackers, providing critical threat intelligence and strengthening defenses through advanced technology and real-time monitoring.
What’s Log Aggregation? A Comprehensive Guide
Learn
4 Minute Read

What’s Log Aggregation? A Comprehensive Guide

Streamline IT operations with log aggregation. Centralizing app, system, and network logs into a unified platform improves security, reduces MTTR, and enables AI-driven observability.
Gear Up for Boss of the SOC 10 at Splunk GovSummit 2026
Industries
3 Minute Read

Gear Up for Boss of the SOC 10 at Splunk GovSummit 2026

Fresh off the heels of BOTS10 at .conf25, we’re bringing the ultimate security showdown to GovSummit.