Skip to main content
false
Leadership
6 Min Read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

Security

Security
3 Min Read
Announcing the availability of Cisco Talos Incident Response services to Splunk customers.
Security 8 Min Read

Observability Meets Security: Build a Baseline To Climb the PEAK

Splunker James Hodgkinson looks at how to apply the baseline hunting process to some common O11y data sources and shows how the OpenTelemetry standard offers easier data analysis.
Security 11 Min Read

LLM Security: Splunk & OWASP Top 10 for LLM-based Applications

Threats to LLMs are real. Let’s look at top LLM threats and show you how, with Splunk, you can better defend LLM-based applications and their users.
Security 3 Min Read

Comprehensive, Continuous, and Compliant: Obtain Proactive Insights with Splunk Asset and Risk Intelligence

Announcing the release of the latest addition to our security product portfolio, Splunk Asset and Risk Intelligence.
Security 2 Min Read

Announcing General Availability of Cisco Talos Intelligence in Splunk Attack Analyzer

We are pleased to announce the general availability of Cisco Talos threat intelligence to all Splunk Attack Analyzer customers globally.

Learn

Latest Articles

Splunk Life 2 Min Read

Blazing the Trail: A Recap of Our First Career Development Month

Our first-ever global Career Development Month was created to offer every employee the time and space to reflect on their career development and learn something new.
Learn 6 Min Read

Individual Contributors vs Managers: Differences in Roles

Explore the differences between individual contributors and managers, their roles, transitions, and synergies in organizations.
Security 11 Min Read

A Case Study in Vulnerability Prioritization: Lessons Learned from Large-Scale Incidents

Splunker Audra Streetman provides an overview of the lessons learned from previous large-scale security incidents to help inform vulnerability prioritization.
Platform 2 Min Read

Automatic Deprovisioning of users for Okta IdP

With the release of the feature, Splunk customers can automatically deprovision users within Splunk when a user(s) are removed from the customer’s Okta Identity Provider (IdP).
Splunk Life 4 Min Read

Meet the Splunktern: Rayyan Lababidi

Rayyan Lababidi, a Digital Sales Intern in Melbourne, AU, reflects on her time as a Splunktern, shares career aspirations, and provides insights for those interested interning at Splunk.

Splunk is Elevating Customer Success To Help Drive a Brighter Future

Efficient and elevated customer service is integral to success for any business., and that's our mission at Splunk for every customer every day.
Security 5 Min Read

Splunk SOAR Evolved: A Unified TDIR Approach to Automation

Splunk SOAR 6.3.0 and 6.3.1 constitute a significant evolution in how security practitioners can implement, use, and leverage security automation in the SOC more efficiently.
Learn 7 Min Read

Maximum Acceptable Outage (MAO) Explained

Learn how Maximum Acceptable Outage (MAO) helps organizations minimize downtime and ensure business continuity.

Splunk Technical Experts Help Drive Business Outcomes

Splunk technical experts help drive value for customers by enhancing applications, integrations, and business outcomes.