Skip to main content
false
Leadership
6 min read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

Security

Security
3 min read
Announcing the availability of Cisco Talos Incident Response services to Splunk customers.
Security 8 Min Read

Observability Meets Security: Build a Baseline To Climb the PEAK

Splunker James Hodgkinson looks at how to apply the baseline hunting process to some common O11y data sources and shows how the OpenTelemetry standard offers easier data analysis.
Security 11 Min Read

LLM Security: Splunk & OWASP Top 10 for LLM-based Applications

Threats to LLMs are real. Let’s look at top LLM threats and show you how, with Splunk, you can better defend LLM-based applications and their users.
Security 3 Min Read

Comprehensive, Continuous, and Compliant: Obtain Proactive Insights with Splunk Asset and Risk Intelligence

Announcing the release of the latest addition to our security product portfolio, Splunk Asset and Risk Intelligence.
Security 2 Min Read

Announcing General Availability of Cisco Talos Intelligence in Splunk Attack Analyzer

We are pleased to announce the general availability of Cisco Talos threat intelligence to all Splunk Attack Analyzer customers globally.

Learn

Latest Articles

Now Answering All Your Questions From a Single Search

Splunker Jennifer Swallow announces a new federated search across Splunk knowledge sites, including Splunk Lantern, making it easier for customers to find answers in one place.
Learn 6 Min Read

Log Analysis: A Complete Introduction

Learn what log analysis is, explore key techniques and tools, and discover practical tips to effectively analyze system log files.
Learn 5 Min Read

What Is ISO 42001 for AI?

ISO 42001 is a standard for establishing, implementing, maintaining, and continually improving your Artificial Intelligence Management System (AIMS).
Global Impact 4 Min Read

London to Paris Cycle for Prostate Cancer - Rider Analytics

With the London to Paris ride now complete, and the fundraising target well on its way, it’s the perfect time to dive into the technical magic that made it possible to track the journey in real-time.
Learn 5 Min Read

Black Hat & DEF CON: 2024 Wrap-Up & 2025 Preview

This blog post covers the basics of what you need to know about both Black Hat USA and Def Con.
Learn 6 Min Read

What Is IoT Security? A Complete Overview

IoT security is a threat protection mechanism and cybersecurity strategy that defends IoT devices against vulnerabilities.
Tips & Tricks 4 Min Read

Dashboard Studio: Tabbed Dashboards

In Splunk Cloud Platform 9.2.2406, Dashboard Studio introduces a number of new features that will streamline and improve your dashboard designing experience.
Learn 7 Min Read

Phishing Attacks: Protecting Against Them

Phishing attacks exploit social engineering to deceive victims into disclosing sensitive information or installing malware.
Learn 7 Min Read

SBOMs: Software Bill of Materials, Explained

The software bill of materials (SBOM) lists all component parts and software dependencies used in application development and delivery.