Skip to main content
false
Leadership
6 min read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

Security

Security
6 min read
Announcing the release of Splunk Security Essentials version 3.8.0, which adds maturity journey and benchmarking.
Security 3 Min Read

Staff Picks for Splunk Security Reading March 2024

Welcome to the March 2024 Splunk staff picks, featuring a curated list of presentations, whitepapers, and customer case studies that we feel are worth a read.
Security 4 Min Read

UEBA Superpowers: Enhance Security Visibility with Rich Insights to Take Rapid Action Against Threats

Splunk UBA illuminates hidden corners of your org's digital ecosystem, providing unparalleled visibility into behaviors and patterns that define the network's pulse.
Security 5 Min Read

Add To Chrome? - Part 4: Threat Hunting in 3-Dimensions: M-ATH in the Chrome Web Store

SURGe experiments with a method to find masquerading using M-ATH with Splunk and the DSDL App.
Security 7 Min Read

Detecting New Domains in Splunk (Finding New Evil)

Ready to find "new" domains that may be naughty? We'll walk you through how to use Splunk & Splunk Enterprise Security to do that: get the full story here!

Learn

Latest Articles

Platform 4 Min Read

Why You Need Observability With the Splunk Platform

Splunk Observability Cloud allows you to get the full picture of your events in one same place.
Learn 6 Min Read

CAP Theorem & Strategies for Distributed Systems

Often misunderstood, the CAP Theorem is important to get right. Learn what the CAP theorem really is about, so your distributed systems stay resilient.
Security 4 Min Read

UEBA Superpowers: Enhance Security Visibility with Rich Insights to Take Rapid Action Against Threats

Splunk UBA illuminates hidden corners of your org's digital ecosystem, providing unparalleled visibility into behaviors and patterns that define the network's pulse.
Learn 4 Min Read

Asset & Application Discovery: How It Works

Protecting and securing your IT assets starts with knowing what IT assets you have. Learn how IT asset discovery works here.
Learn 3 Min Read

Intelligent Applications Explained

Intelligent Applications are a Top 10 Strategic Tech Trend from Gartner. Learn how an app can become intelligent — and what that means for business.
Learn 5 Min Read

Open Source vs. Closed Source Software

Understand the two models for software today: open source and closed source. Deciding which works for you comes down to need and preference.
Learn 7 Min Read

Business Impact Analysis (BIA): The Complete Guide

A business impact analysis helps you prepare for service continuity in the face of disruption. Get the full story and the 8-step BIA process here.
Learn 5 Min Read

Network Traffic & Network Congestion: The Complete Guide

Network traffic is critical for businesses today. Read on to learn how network traffic works, and how to stop traffic congestion.
Learn 4 Min Read

Secure By Design: What Makes Software SbD

As the digital landscape continues to evolve, new cyber threats continue to emerge. It’s imperative to have safeguards in place early on in the product development process. That’s where Secure by Design comes in.