false
Join the .conf25 Global Broadcast online!
Join the .conf25 Global Broadcast online!
Splunk Blogs
Leadership
3 Min Read
Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Learn 5 Min Read

Federated Data Explained: Empowering Privacy, Innovation & Efficiency

Discover the power of federated data systems: enhanced privacy, innovation, and decentralized storage — and get key insights into implementation challenges.
.conf & .conf Go 7 Min Read

.conf23: Asia Pacific Attendees Guide to the Must-Attend APAC Sessions

Splunker David Allinson shares a list of the recommended sessions for Asia Pacific attendees at .conf23.
Security 11 Min Read

The Security Detail Podcast: Exploring Cyber Threats Across Different Industries

SURGe, Splunk’s strategic security research team, examines the cyber threat landscape across different industries in a new podcast series called The Security Detail.
Partners 1 Min Read

Art of Data: Resilience in F1

As we gear up to the summer F1 races with Canada this weekend before F1 heads to Europe, we sat down with Lando Norris and new McLaren driver Oscar Piastri to discover what makes them both tick on and off the track.
Learn 6 Min Read

The Purple Team: Combining Red & Blue Teaming for Cybersecurity

Learn how purple teams bridge the gap between offensive and defensive security strategies, and are helping organizations identify and mitigate risks effectively
Leadership 1 Min Read

Splunk Welcomes Alexandra Turbitt as the New General Vice President of its EMEA Partner Organisation

Get to know Splunk's new GVP of Splunk’s EMEA Partner Organisation, Alexandra Turbitt.
Security 7 Min Read

Detecting DNS Exfiltration with Splunk: Hunting Your DNS Dragons

DNS data is an all-too-common place for threats. Find out how to use Splunk to hunt for threats in your DNS. We will slay those DNS dragons.
Learn 6 Min Read

Authentication vs. Authorization

Discover the fundamental differences between authentication and authorization, explore techniques, and best practices to implement robust security measures.
Learn 4 Min Read

How Digital Fingerprinting Tracks, Identifies & Affects Us

Everything you do on the internet leaves behind pieces of data, these make up your digital fingerprint. Here's what to know about managing your privacy online.