false
Join the .conf25 Global Broadcast online!
Join the .conf25 Global Broadcast online!
Splunk Blogs
Leadership
3 Min Read
Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Leadership 2 Min Read

Destination: Greater Digital Resilience

Splunk’s Chief Revenue Officer Christian Smith shares a new resource to help organizations build greater digital resilience.
Learn 3 Min Read

Amdahl’s Law: Understanding the Basics

Learn how Amdahl's Law guides system optimization in computing. Identify bottlenecks, maximize returns, and leverage parallel computing
Learn 5 Min Read

The 3 Rs of Enterprise Security: Rotate, Repave, Repair

Protect your enterprise from evolving cyber threats with the 3Rs of security: Rotate, Repave, and Repair. Stay ahead of attackers and secure your organization.
Security 3 Min Read

Staff Picks for Splunk Security Reading July 2023

Welcome to the July 2023 edition of our Splunk staff picks blog, featuring a list of presentations, whitepapers, and customer case studies that we feel are worth a read.
Security 4 Min Read

Turning Hunts Into Detections with PEAK

In this post, we’re going to look at something the PEAK framework refers to as the Hierarchy of Detection Outputs.
Learn 6 Min Read

What is HSTS?

Learn about HTTP Strict Transport Security (HSTS) for secure web communication, mitigating threats, and its limitations.
Platform 3 Min Read

Fastest Time-to-Value Anomaly Detection in Splunk: The Splunk App for Anomaly Detection 1.1.0

Splunk App for Anomaly Detection simplifies ML, making anomaly detection easy. It streamlines tasks, enabling ML integration in everyday workflows. Just load data, select the field, and click "Detect Anomalies."
Platform 3 Min Read

Swimming in Sensors and Drowning in Data: The Role of Splunk Partners in Delivering Splunk Edge Hub

With the proliferation of edge computing and the release of Splunk Edge Hub, partners have additional functionality to accelerate the detection, investigation and response of threats and issues that will inevitably occur in physical and industrial environments.
Security 8 Min Read

Amadey Threat Analysis and Detections

The Splunk Threat Research Team shares a deep-dive analysis of the Amadey Trojan Stealer, an active and prominent malware that first emerged on the cybersecurity landscape in 2018 and has maintained a persistent botnet infrastructure ever since.