Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.
Announcing a transformative update to Splunk Enterprise Security (ES) with 8.2: An AI-powered SecOps platform designed to unify and accelerate threat detection, investigation, and response (TDIR) in one seamless experience.
At .conf25, we unveiled new capabilities in Splunk Observability Cloud that redefine digital resilience in the AI era with smarter detection and investigation of business-critical issues.
Kamal Hathi shares how Cisco and Splunk are helping organizations manage the explosion of machine data and AI-driven complexity, delivering real-time digital resilience to counter threats at machine speed and scale.
Announcing the general availability of Splunk Enterprise 10.0 and Splunk Cloud Platform 10.0, the most secure, stable, and modernized platform for a digitally resilient, compliance-ready future.
Splunk's enhanced UEBA capability, now natively available in ES, empowers SOCs to transition from reactive, fragmented workflows to a proactive, behavior-driven security posture.
Introducing AI Infrastructure Monitoring and AI Agent Monitoring in Splunk Observability Cloud and AppDynamics LLM Monitoring – providing visibility and protection across your AI stack.
The updated AppDynamics Agent provides customers with a common agent to collect telemetry data for use in either Splunk AppDynamics or Splunk Observability Cloud.
Large language models have changed the world. What about small language models? Learn what SLMs are, how they differ from LLMs, and why SLMs are the future.
Telemetry is powerful data that can tell you all sorts of important information. Know what you can do with this useful data — get the full telemetry 101 here.
Endpoints sound like an afterthought...not like the most important part of your cybersecurity posture. Learn what endpoints are, and why detecting them is so important.
Discover the role of endpoint security in protecting network integrity. This guide shares insights into implementing robust security measures for effective cyber defense.
Attack surfaces changing daily? Cyber threats on the rise? Old ways of working ain't cutting it? CTEM may be your cyber solution. Get the full story here.
In this article, let’s look at SaaS security: what it is, the most common threats to SaaS and actionable best practices for securing SaaS applications.
Discover insights from the Splunk Threat Research Team on Microsoft 365 threat detection, focusing on data source analysis and effective methods for hunting initial access threats.