false
Watch the .conf25 Global Broadcast online!
Watch the .conf25 Global Broadcast online!
Splunk Blogs
Leadership
3 Min Read
Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Learn 5 Min Read

Using Splunk for SEO Log File Analysis

This blog post will showcase just a few of the ways we’re using Splunk to improve our own technical SEO.
Learn 7 Min Read

What is DevOps Automation?

Automation is essential to DevOps — but it’s not easy. This guide details how to automate DevOps and the best tools for the job so you can succeed in no time!
Observability 2 Min Read

Observability to Modernize Apps and Increase Business Resilience

With Splunk Observability, your business can deploy applications faster and optimize the customer experience at the speed of modern business.
Splunk Life 2 Min Read

Splunk's Black Employees and Mentors ERG at Brothers Code 2022

When Splunkers have an opportunity to do meaningful work within their communities, they always answer the call.
Industries 4 Min Read

Cyber Resilience Through the Eyes of Our Public Sector Customers

With cyber resilience high on the agenda at GovSummit 2022, Splunk's public sector customers share their cyber resilience experiences and offer feedback on why they use Splunk.
Learn 4 Min Read

CMDBs Explained: Configuration Management Databases

Meant to provide visibility into all IT assets, CMDBs are routinely underutilized. Learn how to plan, implement and maintain a CMDB to maximize business value.
Learn 6 Min Read

What is ETL?

Strengthen your data foundation by knowing ETL. Short for Extract, Transform, Load, the ETL process is vital for turning all that data into business value.
Security 7 Min Read

All the Proxy(Not)Shells

The Splunk Threat Research Team walks through exploitation of ProxyShell and ProxyNotShell using MetaSploit, and hunts through data in Splunk to showcase different avenues for defenders to identify malicious activity.
Security 5 Min Read

Using MITRE ATT&CK in Splunk Security Essentials

Discover how you can use the ATT&CK framework for a wide array of use cases and to answer a wide range of questions in Splunk Security Essentials (SSE).