false
Watch the .conf25 Global Broadcast online!
Watch the .conf25 Global Broadcast online!
Splunk Blogs
Leadership
3 Min Read
Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Observability 4 Min Read

How I fell in love… with Data Governance (no, really)

It’s a romantic story, and I never worried about compliance again. You need Data Governance more than it needs you!
Security 3 Min Read

Splunk Unified Security Operations for Digital Resilience at RSA Conference 2023

Splunk is excited to be joining the cybersecurity community back at the Moscone Center in April for RSA Conference 2023, and to share how we can help unify, simplify and modernize your security operations.
Learn 7 Min Read

The Digital Resilience Guide: 7 Steps To Building Digital Resilience

When faced with major changes and cyberattacks, digital resilience ensures our systems can bounce back. See more, react fast. With digital resilience.
Learn 4 Min Read

SOC 1, 2, 3 Compliance: Understanding & Achieving SOC Compliance

Discover how SOC compliance can give your business a competitive edge and assure your clients to trust your organization with their sensitive data.
Security 5 Min Read

Baselining and Beyond: What's New in OT Security Add-On v2.2

Splunk has released a new version of OT Security Add-On, designed to help organizations understand their cybersecurity risks, improve their security monitoring, and better detect and react to industrial cybersecurity threats.
Learn 5 Min Read

FedRAMP® Compliance: What It Is, Why It Matters & Tips for Achieving It

Learn about FedRAMP® compliance, the security standard to protect the federal government’s most sensitive unclassified data in the cloud.
Splunk Life 2 Min Read

March 2023 Living Our Values Award Winners

Congratulations to the five Splunkers and one team who truly embody our core values as a company!
Learn 6 Min Read

Credential Stuffing: How To Prevent It

One more reason to NOT reuse passwords! Credential stuffing is the most common cyberattack today. Read here for expert details on how to stop these attacks.
Learn 6 Min Read

Data Streaming: A Complete Introduction

Ever think about how you receive messages so quickly? 🌊 That’s all thanks to Data Streaming, the backbone of so many technologies we rely on daily.