/en_us/blog/ciso-circle/ciso-ai-strategy-digital-resilience

Splunk Blogs

Artificial Intelligence

Learn

Latest Articles

Talk to Your Logs: LLM-Powered Chat UI in DSDL 5.2.3
Artificial Intelligence
5 Minute Read

Talk to Your Logs: LLM-Powered Chat UI in DSDL 5.2.3

Announcing the release of the Splunk App for Data Science and Deep Learning (DSDL) version 5.2.3.
Quality Management Explained: From TQM to Modern QMS
Learn
4 Minute Read

Quality Management Explained: From TQM to Modern QMS

Discover the basics of quality management, including key frameworks, principles, and tools to help organizations deliver consistent excellence.
Geopatriation Explained: Sovereignty, AI, and Jurisdictional Control
Learn
8 Minute Read

Geopatriation Explained: Sovereignty, AI, and Jurisdictional Control

As AI and sovereignty pressures grow, geopatriation helps organizations reduce jurisdictional risk and regain control over cloud workloads.
Data Sovereignty vs. Data Residency: What's The Difference?
Learn
5 Minute Read

Data Sovereignty vs. Data Residency: What's The Difference?

Understand data sovereignty vs data residency for informed data management. Make compliant storage decisions in a complex data-driven world.
Why Your Network is Your Best Defense: A Complete Guide to Threat Detection, Investigation, and Response
Security
3 Minute Read

Why Your Network is Your Best Defense: A Complete Guide to Threat Detection, Investigation, and Response

Discover how to leverage your network for threat detection and response. Learn how Splunk and Cisco integrations reduce MTTD, MTTR, and MTTC in modern SOCs.
Powering Security Innovation: Executive Q&A on Splunk Joining AWS Security Hub Extended
Partners
5 Minute Read

Powering Security Innovation: Executive Q&A on Splunk Joining AWS Security Hub Extended

Splunk’s collaboration with Amazon Web Services (AWS) elevates AWS Security findings into native detections within Splunk, surfacing high-priority incidents in near real time and reducing operational friction for security teams.
Splunking Isovalent Data: Attack Simulations and Detections
Security
9 Minute Read

Splunking Isovalent Data: Attack Simulations and Detections

Detect Kubernetes threats with Cisco Isovalent eBPF telemetry and Splunk. Explore real-world attack simulations, from port scans to privilege escalation.
Balancing AI Innovation and Control in Service Ops
Cio Office
4 Minute Read

Balancing AI Innovation and Control in Service Ops

Discover the benefits and risks of AI adoption in service operations. Uncover best practices to maximize value, manage data privacy, and empower teams for better customer service.
Breaking Trust in MMC: XMLDriven Malicious Loader via .MSC Files
Security
5 Minute Read

Breaking Trust in MMC: XMLDriven Malicious Loader via .MSC Files

Learn how attackers abuse Microsoft Management Console (.msc) files and XML loaders to execute malware. Discover detection strategies using Splunk and MITRE ATT&CK.