false
Watch the .conf25 Global Broadcast on demand
Watch the .conf25 Global Broadcast on demand
Splunk Blogs
Leadership
3 Min Read
Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Security 7 Min Read

Laying the Foundation for a Resilient Modern SOC

Splunk Security supports your journey to digital resilience by providing comprehensive security visibility to reduce business risk; equipping your team with risk-based threat detection, investigation, and response technologies to help you build a modern SOC; and fueling security innovation through Splunk’s vibrant community.
Leadership 4 Min Read

Navigating the Intersection of Cyber Threats, AI-Powered Challenges, and Digital Resilience to Safeguard Critical National Infrastructure

In today's interconnected world, the protection of critical national infrastructure has become more crucial than ever – here's how organisations can enhance their ability to withstand and recover.
Learn 7 Min Read

SOAR: Security Orchestration, Automation & Response

SOAR revolutionizes how security operations teams manage, analyze and respond to alerts and threats. Learn what a modern SOAR solution is — and isn't.
Security 8 Min Read

Unmasking the Enigma: A Historical Dive into the World of PlugX Malware

The Splunk Threat Research Team (STRT) unravels the mystery of a PlugX variant, peeling back the layers of its payload, tactics, and impact on the digital realm.
Industries 3 Min Read

Future-Proofing Resilience: How Manufacturers Are Navigating Growing Pains of IT/OT Convergence

As manufacturing grapples with digitization challenges, Splunker Tom Harrop dives into how the manufacturing industry is future-proofing resilience.
Observability 4 Min Read

The Hidden Side of Observability

Everything is “observability” these days. But not all solutions are created equally. In fact, they are very different once you look behind the (architectural design) curtain. They have very different architectures and don’t collect data in the same way. Find out what the differences are and what you need to consider.
CISO Circle 2 Min Read

3 Gift Ideas for CISOs This Holiday Season

Whether your CISO has been naughty or nice, these wishlist items will ensure your organization remains resilient and secure in the face of cyber threats.
Security 6 Min Read

User Behavior Monitoring with M-21-31

OMB M-21-31 requires US Federal Civilian agencies to implement user behavior monitoring. We'll explain what that means and how to do it right.
Observability 8 Min Read

Why Is Log Data So Important In Observability?

Traditional monitoring approaches struggle in digital platforms and they do not collect the rich data contained in the logs. Observability, with OpenTelemetry, is the key to managing these platforms and it is based on the capture and analysis of three types of telemetry; metrics, traces and logs.