false
Watch the .conf25 Global Broadcast on demand
Watch the .conf25 Global Broadcast on demand
Splunk Blogs
Leadership
3 Min Read
Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Learn 4 Min Read

CVSS: The Common Vulnerability Scoring System

Common Vulnerability Scoring System (CVSS) is a framework designed to provide a consistent and objective way to assess the severity of security vulnerabilities in IT systems. Learn more in this blog post.

ManpowerGroup’s Unique Approach to Resilience with Splunk

CEO of The Futurum Group Daniel Newman sat down with Randy Herold, CISO & Chief Privacy Office of ManpowerGroup, to talk building digital resilience with Splunk.
CISO Circle 3 Min Read

5 Ingredients for a Robust Cybersecurity Culture

Shefali Mookencherry, Chief Information Security & Privacy Officer at the University of Illinois-Chicago, shares insights from the two decades she’s spent in cybersecurity and higher education.

AI Predictions Are Fueling Greater Cyber Up-Skilling Needs

Use our new Splunk Education e-book to guide the cybersecurity learning journey in this AI-dominated era.
Splunk Life 3 Min Read

A Coming-of-Age Brand Story

Splunk, meet your refresh – Splunker Adam Morgan shares his insights on the latest evolution of the Splunk brand.
Splunk Life 7 Min Read

Behind the Scenes with the Splunk Brand Refresh

Splunker Adam Morgan shares a behind-the-scenes look at Splunk's recent brand refresh.
Security 9 Min Read

Another Year of RATs and Trojan Stealer: Detection Commonalities and Summary

The Splunk Threat Research Team shares analysis, analytic stories and security detections for seven well-known RAT and Trojan Stealer malware families.
Security 4 Min Read

How Tech Executives Can Support Gender Diverse Cyber Talent

The number of unfilled cybersecurity roles creates a perfect opportunity for leaders to attract female talent at their organizations.
Learn 3 Min Read

Homomorphic Encryption: How It Works

Homomorphic encryption is a new way to protect data. Learn how homomorphic encryption reduces certain problems inherent in traditional decryption.