Splunk announces innovations across its observability portfolio to provide organizations deeper visibility into their network health through integrations with Cisco, and faster troubleshooting with the help of AI.
Splunk's 'The New Rules of Data Management: Creating Value in the AI Era' report captures trending shifts in data management and examines how organizations are structuring — and should be potentially rethinking — their data strategies.
Remote Employment Fraud actors don’t steal credentials—they’re issued them. This blog explores early detection and why security can’t face this threat alone.
The latest articles from Splunk, straight to your inbox
Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Learn how Splunk Global Security runs ops at scale and enables the business by focusing on what matters—solving problems through data, automation, and collaboration.
Large language models have changed the world. What about small language models? Learn what SLMs are, how they differ from LLMs, and why SLMs are the future.
Telemetry is powerful data that can tell you all sorts of important information. Know what you can do with this useful data — get the full telemetry 101 here.
Davos is usually known for its variety of sports, leisure and cultural activities. Once a year, rather than tourists, this beautiful Swiss community attracts business leaders as well as government officials and policy-makers.
Automation is essential to DevOps — but it’s not easy. This guide details how to automate DevOps and the best tools for the job so you can succeed in no time!
With cyber resilience high on the agenda at GovSummit 2022, Splunk's public sector customers share their cyber resilience experiences and offer feedback on why they use Splunk.
Meant to provide visibility into all IT assets, CMDBs are routinely underutilized. Learn how to plan, implement and maintain a CMDB to maximize business value.
Strengthen your data foundation by knowing ETL. Short for Extract, Transform, Load, the ETL process is vital for turning all that data into business value.
The Splunk Threat Research Team walks through exploitation of ProxyShell and ProxyNotShell using MetaSploit, and hunts through data in Splunk to showcase different avenues for defenders to identify malicious activity.