Skip to main content
false
Leadership
6 min read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

Security

Security
6 min read
Announcing the release of Splunk Security Essentials version 3.8.0, which adds maturity journey and benchmarking.
Security 3 Min Read

Staff Picks for Splunk Security Reading March 2024

Welcome to the March 2024 Splunk staff picks, featuring a curated list of presentations, whitepapers, and customer case studies that we feel are worth a read.
Security 4 Min Read

UEBA Superpowers: Enhance Security Visibility with Rich Insights to Take Rapid Action Against Threats

Splunk UBA illuminates hidden corners of your org's digital ecosystem, providing unparalleled visibility into behaviors and patterns that define the network's pulse.
Security 5 Min Read

Add To Chrome? - Part 4: Threat Hunting in 3-Dimensions: M-ATH in the Chrome Web Store

SURGe experiments with a method to find masquerading using M-ATH with Splunk and the DSDL App.
Security 7 Min Read

Detecting New Domains in Splunk (Finding New Evil)

Ready to find "new" domains that may be naughty? We'll walk you through how to use Splunk & Splunk Enterprise Security to do that: get the full story here!

Learn

Latest Articles

Learn 2 Min Read

Log Monitoring with AI: What Makes Monitoring Intelligent?

Monitoring log data offers so many benefits and proactive approaches in your organization. Understand what using AI for log monitoring can do, too.
Splunk Life 2 Min Read

The Endless Possibilities of Diverse Thinking

Splunk's Tom Casey reflects on what it means to be neurodivergent and how valuable it is to include people with different brains.
Learn 3 Min Read

Incident Review: How To Conduct Incident Reviews & Postmortems

Reviewing incidents or doing an “incident postmortem” helps your team learn from incidents. Learn the best ways to maximize the value in your incident review practice.
DevOps 11 Min Read

Don’t Live in the Past - APM 3.0 and Why You Need It

Application Performance Monitoring (APM) as a discipline and as a collection of supporting technologies has evolved rapidly since a distinct recognisable market for APM products first emerged in the 2007 - 2008 time frame. While there are many who would argue that APM has mutated into or been replaced by Observability, it makes more sense to see APM as one of many possible use cases now able to exploit the functionalities that Observability brings to the table - particularly when combined with AI.
Learn 3 Min Read

Data Center Security: Today’s Essentials

Get started with data center security (on-premises and cloud), including what it encompasses, how to secure data centers and important standards to consider.
Learn 6 Min Read

Business Process Reengineering (BPE) Explained

Let’s face it: processes at work don’t always work. Business process reengineering helps you stay on top of constant change while still accomplishing your most important goals.
Learn 3 Min Read

Data & Database Normalization Explained: How To Normalize Data

Learn about the process of data normalization, including the different types of data normal forms, the benefits of normalized data for your business and more.
Security 12 Min Read

Detecting & Hunting Named Pipes: A Splunk Tutorial

Named pipes can be threats, too. In this comprehensive article, we are going to talk about detecting, hunting and investigating named pipes.
Learn 8 Min Read

9 Best Data Analysis Tools to Work With in 2024

Data analysis is an imperative, but how do you do it well? Start with these top data analyst tools, put together like only professional data analysts can.