false
Watch the .conf25 Global Broadcast on demand
Watch the .conf25 Global Broadcast on demand
Splunk Blogs
Leadership
3 Min Read
Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

CTO Stack 1 Min Read

Perspectives Podcast: Leadership Lessons From Splunk CEO Gary Steele

Splunk CEO Gary Steele shares his perspective on AI, innovation and the current economic landscape — and reveals whether he’d ever appear on Undercover Boss.
Learn 7 Min Read

Data Fabric Architecture: Benefits, Best Practices & Trends

Data architecture is a Big Topic for many today. Learn about the data fabric architecture, get started on your own, and consider trends that impact how we treat our data.
Learn 6 Min Read

The Common Information Model (CIM) Defined

CIM is a standard approach to represent & describe diverse system components. Read on to learn all about CIM, core concepts, and the benefits it brings to organizations.
Learn 6 Min Read

IT Infrastructure Defined

Let's answer the question "What exactly is IT infrastructure?" We'll drill down on the different types and categories of IT infrastructure, how to manage it, as well as what the future holds.
Partners 1 Min Read

Splunk Achieves AWS Retail Competency Status

We are excited to announce that Splunk has officially attained the coveted Amazon Web Services (AWS) Retail Competency status.
Observability 5 Min Read

Correlation Does Not Equal Causation - Especially When It Comes to Observability [Part 1]

Observability has been tied up with causality from its origins in the mathematical realm of control theory in the early 1960s. But what precisely does the term ‘causality’ denote? In how does correlation come into play when it comes to observability? Read on to find out more.
Splunk Life 2 Min Read

Lexi’s Unexpected Path to Tech

Get to know Splunker Alexandra Nuttbrown, one of the co-leads of our Womxn+ Employee Resource Group which helps foster, empower and grow a diverse womxn-led community.
Security 6 Min Read

Threat Hunting for Dictionary-DGA with PEAK

Explore applied model-assisted threat hunting for dictionary-based domain generation algorithms using the SURGe Security Research Team's PEAK Threat Hunting Framework.
Learn 7 Min Read

Data Security Today: Threats, Techniques & Solutions

Data security is more important than ever. With organizations relying heavily on technology for their sensitive information, the risk of data breaches is constantly rising.