Splunk's 'The New Rules of Data Management: Creating Value in the AI Era' report captures trending shifts in data management and examines how organizations are structuring — and should be potentially rethinking — their data strategies.
Every month, our Splunk staff of security experts share their favorite reads of the month — this way, you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Large language models have changed the world. What about small language models? Learn what SLMs are, how they differ from LLMs, and why SLMs are the future.
Telemetry is powerful data that can tell you all sorts of important information. Know what you can do with this useful data — get the full telemetry 101 here.
Energy and energy management are top of mind for all types of organizations to build resilience.
Read on to learn about a data-driven approach by unlocking a new observability use case: reducing energy costs, increasing energy efficiency and improving the carbon footprint for buildings, data centers and factories across industries.
In this version 5.2 release of Splunk DSDL, we introduce new functionalities utilizing retrieval-augmented generation with local large language models and a vector database. In this blog, we provide an overview of various use cases supported through a set of DSDL commands and dashboards.
Discover how Splunk and the Cisco Store showcase digital resilience at NRF 2025, featuring cutting-edge retail technologies like AI chatbots, Meraki Video, and real-time data analytics. Learn about personalized customer experiences and the importance of innovation and security in the evolving retail landscape.
Splunk's Asset and Risk Intelligence enhances security by uncovering hidden vulnerabilities, prioritizing critical threats, and offering dynamic risk scoring for proactive risk mitigation and compliance.
Learn how security intelligence uses real-time data, AI, and machine learning to anticipate, detect, and respond to evolving cybersecurity threats effectively.