false
Splunk Blogs
Observability
3 Min Read
Splunk releases its newest report, State of Observability 2025: The Rise of a New Business Catalyst.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Learn 8 Min Read

Top 10 SIEM Use Cases Today: Real Examples and Business Value

Explore 10 real-world SIEM use cases — from log aggregation to insider threat detection — with examples, benefits, and tips for implementation.
Security 10 Min Read

CitrixBleed 2: When Memory Leaks Become Session Hijacks

Discover how to detect, mitigate, and respond to CitrixBleed 2 (CVE-2025-5777), a critical Citrix NetScaler ADC and Gateway vulnerability exploited in the wild.
Learn 8 Min Read

Qualitative vs Quantitative: Which Research Method is Right for You?

Learn the differences, uses, and benefits of qualitative vs. quantitative research. Discover how to choose the right method for your data and projects.
Learn 8 Min Read

8 Kubernetes Certifications to Boost Your Cloud Career in 2025: Costs, Levels & Resources Compared

Explore 8 top Kubernetes certifications by level with details on costs, prerequisites, providers, and exam formats — ideal for cloud and DevOps careers.
Learn 7 Min Read

Four Database Types You Need to Know

Discover the four main database types, their features, strengths, and best use cases — plus tips on choosing the right one for your application or business.
CISO Circle 4 Min Read

Data Federation Brings SOC Teams Up to Attack Speed

Discover how data federation helps SOC teams overcome data complexity, silos, and staffing challenges to boost security and efficiency.
Security 20 Min Read

Unlocking Endpoint Network Security Insights with Cisco Network Visibility Module (NVM) and Splunk

Unlock deep endpoint network security insights by integrating Cisco NVM with Splunk.
Learn 9 Min Read

What Is Detection as Code (DaC)? Benefits, Tools, and Real-World Use Cases

Learn how Detection as Code transforms security rule management with Git, CI/CD, and automation. See real examples and tools to get started.

Using Splunk to Develop Local LLM MCP Mitre Atlas Detections

This comprehensive guide covers setting up a dockerized lab, log management, and detection strategies to secure AI-enabled systems against real-world threats.