false
Leadership
4 Min Read
Splunk's 'The New Rules of Data Management: Creating Value in the AI Era' report captures trending shifts in data management and examines how organizations are structuring — and should be potentially rethinking — their data strategies.

Featured Articles

Security

Learn

Latest Articles

Security 5 Min Read

Enhance Security Resilience Through Splunk User Behavior Analytics VPN Models

This blog introduces new machine learning models in Splunk UBA for VPN connection monitoring to enhance WFH security resilience.
Leadership 11 Min Read

How Splunk and Cisco will Keep Customers at the Center

Together, Cisco and Splunk can unlock many more opportunities to help securely connect everything all while building a safer and more resilient digital world.
Learn 11 Min Read

The Digital Transformation Beginner's Guide

In this blog post we'll take a look at digital transformation - what it means, why its happening, and the impact is having on businesses globally.
Learn 10 Min Read

Value Stream Management: A Brief Explainer

In this blog post, we'll look at the importance of value streams and value stream management in software delivery and the digital enterprise.
Learn 6 Min Read

ELT: Extract Load Transform, Explained

ELT is fundamentally different from the traditional ELT process: see what ELT offers, including massive flexibility, in this complete guide.
Learn 5 Min Read

Insider Threats in Cybersecurity

Security anything isn't limited to outsiders. People on the inside can breach your security too. Read how in this guide to insider threats.
Observability 5 Min Read

Observability for Sustainability

For the past 20 years, the various stakeholder communities that together constitute the IT industry have attempted to address sustainability. Could observability help in practicing sustainable IT and improving the carbon footprint reduction in its operations?
Security 10 Min Read

More Than Just a RAT: Unveiling NjRAT's MBR Wiping Capabilities

The Splunk Threat Research Team (STRT) provides a deep-dive analysis of NjRAT (or Bladabindi), a Remote Access Trojan (RAT) discovered in 2012 that's still active today.
Learn 9 Min Read

Customer Data Management (CDM): An Introduction

In this blog post, we'll take a look at the important role of Customer Data Management for IT and other professionals.