MachineGPT brings the power of generative AI to one of the most overlooked resources: machine data. Splunk SVP & GM Kamal Hathi explains why mastering data as the heartbeat of the digital world is a game changer.
Splunk announces a donation to the OpenTelemetry project that will help solve the challenges of implementation for everyone — the OpenTelemetry Injector.
The latest articles from Splunk, straight to your inbox
Splunk's Kamal Hathi recaps our innovation highlights from .conf25, marking a pivotal moment for Splunk and Cisco as we deliver significant new value to our customers that make the use of AI a practical reality in their organizations.
At .conf25, we unveiled new capabilities in Splunk Observability Cloud that redefine digital resilience in the AI era with smarter detection and investigation of business-critical issues.
Announcing a transformative update to Splunk Enterprise Security (ES) with 8.2: An AI-powered SecOps platform designed to unify and accelerate threat detection, investigation, and response (TDIR) in one seamless experience.
Large language models have changed the world. What about small language models? Learn what SLMs are, how they differ from LLMs, and why SLMs are the future.
Telemetry is powerful data that can tell you all sorts of important information. Know what you can do with this useful data — get the full telemetry 101 here.
Davos is usually known for its variety of sports, leisure and cultural activities. Once a year, rather than tourists, this beautiful Swiss community attracts business leaders as well as government officials and policy-makers.
Automation is essential to DevOps — but it’s not easy. This guide details how to automate DevOps and the best tools for the job so you can succeed in no time!
With cyber resilience high on the agenda at GovSummit 2022, Splunk's public sector customers share their cyber resilience experiences and offer feedback on why they use Splunk.
Meant to provide visibility into all IT assets, CMDBs are routinely underutilized. Learn how to plan, implement and maintain a CMDB to maximize business value.
Strengthen your data foundation by knowing ETL. Short for Extract, Transform, Load, the ETL process is vital for turning all that data into business value.
The Splunk Threat Research Team walks through exploitation of ProxyShell and ProxyNotShell using MetaSploit, and hunts through data in Splunk to showcase different avenues for defenders to identify malicious activity.