false
Leadership
4 Min Read
Splunk's 'The New Rules of Data Management: Creating Value in the AI Era' report captures trending shifts in data management and examines how organizations are structuring — and should be potentially rethinking — their data strategies.

Featured Articles

Security

Learn

Latest Articles

Security 4 Min Read

Deep Learning in Security: Text-based Phishing Email Detection with BERT Model

We introduced a large language model (LLM)-based phishing email detector integrated into the Splunk DSDL app. We provide details on model training and evaluation, comparisons to other machine learning and deep learning algorithms as well as deployment approaches to Splunk in this blog.
Learn 5 Min Read

Data Governance: Definitions, Components, & Best Practices

Discover the importance of data governance in a data-driven world. Learn key components, benefits, and best practices for secure, high-quality data.
Learn 6 Min Read

SLA vs. SLI vs. SLO: Understanding Service Levels

Discover the key differences between SLAs, SLOs, and SLIs in service-driven businesses. Learn best practices and overcome challenges in implementing these crucial metrics.

Your Self-Managed Journey to Digital Resilience

No matter your industry, starting point, or organizational size, the Use Case Explorers for Security and Observability will help you improve digital resilience.
Splunk Life 3 Min Read

August 2023 Living Our Values Award Winners

Congratulations to the August 2023 'Living Our Values' award winners who truly embody Splunk's core values as a company!
Learn 8 Min Read

What is Cloud Security? Types, Risks & Benefits Defined

Explore the world of cloud security! Learn about types, benefits, risks, and a 6-step framework for robust protection. Stay secure in the cloud.
Observability 3 Min Read

Breaking Through the Threshold: Leveling up ITSI Adaptive Thresholding with Splunk AI

Learn how ML-Assisted Thresholding in Splunk ITSI can recommend the optimal adaptive threshold configurations for KPIs so you can get up and running faster.
Security 9 Min Read

Sharing is Not Caring: Hunting for Network Share Discovery

This post offers a practical guide to enhancing detection strategies against network share discovery, a technique often used by threat actors.
Learn 4 Min Read

Log Data 101: What It Is & Why It Matters

Unlock the log data treasure chest! Log data provides a treasure trove of valuable information, capturing every interaction, every event, and every anomaly happening within a system.