false
Splunk Blogs
Observability
3 Min Read
Splunk releases its newest report, State of Observability 2025: The Rise of a New Business Catalyst.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Security 4 Min Read

Add to Chrome? - Part 1: An Analysis of Chrome Browser Extension Security

An overview of SURGe research that analyzed the entire corpus of public browser extensions available on the Google Chrome Web Store.
Learn 4 Min Read

CVSS: The Common Vulnerability Scoring System

Common Vulnerability Scoring System (CVSS) is a framework designed to provide a consistent and objective way to assess the severity of security vulnerabilities in IT systems. Learn more in this blog post.

ManpowerGroup’s Unique Approach to Resilience with Splunk

CEO of The Futurum Group Daniel Newman sat down with Randy Herold, CISO & Chief Privacy Office of ManpowerGroup, to talk building digital resilience with Splunk.
CISO Circle 3 Min Read

5 Ingredients for a Robust Cybersecurity Culture

Shefali Mookencherry, Chief Information Security & Privacy Officer at the University of Illinois-Chicago, shares insights from the two decades she’s spent in cybersecurity and higher education.

AI Predictions Are Fueling Greater Cyber Up-Skilling Needs

Use our new Splunk Education e-book to guide the cybersecurity learning journey in this AI-dominated era.
Splunk Life 3 Min Read

A Coming-of-Age Brand Story

Splunk, meet your refresh – Splunker Adam Morgan shares his insights on the latest evolution of the Splunk brand.
Splunk Life 7 Min Read

Behind the Scenes with the Splunk Brand Refresh

Splunker Adam Morgan shares a behind-the-scenes look at Splunk's recent brand refresh.
Security 9 Min Read

Another Year of RATs and Trojan Stealer: Detection Commonalities and Summary

The Splunk Threat Research Team shares analysis, analytic stories and security detections for seven well-known RAT and Trojan Stealer malware families.
Security 4 Min Read

How Tech Executives Can Support Gender Diverse Cyber Talent

The number of unfilled cybersecurity roles creates a perfect opportunity for leaders to attract female talent at their organizations.