false
Leadership
4 Min Read
Splunk's 'The New Rules of Data Management: Creating Value in the AI Era' report captures trending shifts in data management and examines how organizations are structuring — and should be potentially rethinking — their data strategies.

Featured Articles

Security

Learn

Latest Articles

Learn 7 Min Read

LLMs vs. SLMs: The Differences in Large & Small Language Models

Today’s language models are powering ChatGPT and other popular AIs. Learn the differences between LLMs and SLMs in this detailed article.
Platform 11 Min Read

Clara-fication: Data Onboarding Best Practices

The Splunk Security Center of Excellence outlines best practices they follow to bring data into Splunk.
Platform 4 Min Read

From Setup to Migration: Azure Event Hubs in Data Manager

Seamlessly integrate Azure Event Hubs with Splunk Data Manager and enhance your data management with efficient, secure, and scalable solutions.
Splunk Life 3 Min Read

Embracing Flexibility to Do Great Work

Work in the ways that work for you. Learn how Splunkers define flexibility, and how they work with their teams to make the best work happen.
Platform 3 Min Read

Introducing Cloud Monitoring Consoles’s New Overview Dashboard: Intuitive Actionable Insights at Your Fingertips

Splunk's Cloud Monitoring Console (CMC) 3.35.0 introduces a new Overview dashboard, centralizing key metrics, highlighting issues, and offering tools to help admins optimize performance and gain faster insights.
Learn 9 Min Read

Security Compliance: A Complete Introduction

Security compliance helps businesses safeguard data, meet regulations, and prevent breaches. Learn key frameworks, roles, and best practices for compliance success.
Learn 5 Min Read

How Logging Works in Kubernetes: Challenges, Approaches, and Solutions for K8s Logging

Managing logs in Kubernetes isn’t easy, but with the right understanding and approaches, you can set up a consistent, unified Kubernetes logging and observability solution.
Learn 7 Min Read

Cloud Automation Explained

Cloud automation streamlines cloud management by automating deployment, scaling, and maintenance. Learn its benefits, challenges, and best practices.
Learn 8 Min Read

How Supply Chain Attacks Work: Definition, Types, Security and Prevention

Supply chain attacks exploit trusted third parties and vendors to gain access to compromise the supply chain. Read on to learn more.