false
Splunk Blogs
Observability
3 Min Read
Splunk releases its newest report, State of Observability 2025: The Rise of a New Business Catalyst.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

.conf & .conf Go 2 Min Read

Making 'Shirt' Happen at .conf23

Customers, partners and Splunkers made their way back to Las Vegas for another year of new Splunk t-shirt announcements and to snag the much anticipated .conf23 hoodie.
Learn 7 Min Read

API Security Threats & How To Protect Against Them

Explore the evolving landscape of API threats and their impact on compliance and risk management. Learn critical best practices to secure your APIs.
Learn 5 Min Read

Data Classification: The Beginner's Guide

Extract meaningful insights from data with data classification. Organize, protect, and manage data while adhering to best practices and achieving compliance.
Security 4 Min Read

Using the Lookup Command for Threat Hunting (Lookup Before You Go-Go)

Lookup commands are basically the #1 place to start any threat hunt in Splunk. Get the expert directions here.
Security 5 Min Read

Measuring Hunting Success with PEAK

Splunker David Bianco explains how an effective threat hunting program is one of the best ways to drive positive change across an organization’s entire security posture.
Tips & Tricks 4 Min Read

Dashboard Studio: Drilldown to New Features in Splunk Cloud Platform 9.0.2305

Learn about the latest Dashboard Studio features such as Link to reports and search, workflow actions for events viewer, expandable code editor, trellis for single values, and a new conversion report.
Security 1 Min Read

Heading to Black Hat? Splunk’s Countdown Is On

Join Splunk at Black Hat 2023 to explore Splunk Attack Analyzer, SURGe research on Chrome browser extension risks, and the latest detection engineering tools from the Splunk Threat Research Team.
Learn 5 Min Read

Infrastructure Engineering Explained: Roles, Responsibilities and Hierarchy

Learn about infrastructure engineering, its role in data center expansion, DevOps, AIOps, hierarchy levels, and strategic tasks for efficient operations.
Learn 4 Min Read

Vulnerability Scanning: The Complete Guide

Learn about the importance of vulnerability scanning for security, its process, types of scans, common vulnerabilities, best practices, and top tools.