false
Leadership
4 Min Read
Splunk's 'The New Rules of Data Management: Creating Value in the AI Era' report captures trending shifts in data management and examines how organizations are structuring — and should be potentially rethinking — their data strategies.

Featured Articles

Security

Learn

Latest Articles

Learn 8 Min Read

Top Risk Management Frameworks To Use

This article introduces risk management frameworks and explains the significance of using one in your organization.
Partners 3 Min Read

Reflections from Cisco Partner Summit 2024: Building the Future as One

Cisco Partner Summit 2024 highlighted the growing recognition of Splunk’s critical role in addressing enterprise security and observability challenges.
Learn 8 Min Read

Data Normalization Explained: An In-Depth Guide

Data normalization is simply a way to reorganize clean data so it’s easier for users to work with and query. Learn more here.
Observability 14 Min Read

DORA, Operational Resilience and Intelligent Observability

DORA brings harmonisation of the rules relating to operational resilience for the financial sector applying to 20 different types of financial entities and ICT third-party service providers and while press discussion (and even the press releases from the EU itself) has emphasised the security dimension of operational resilience, a close reading of the texts associated with the regulation demonstrates an equal if not greater focus on the need for intelligent (i.e. AI enhanced) observability.
Learn 6 Min Read

2025 Cybersecurity Trends: 7 Trends to Watch

Calling all CISOs, security pros & anyone into security: Be prepared (and know how to prepare) for the biggest cyber threats and trends today.
Learn 4 Min Read

What is Privilege Escalation? An Introduction

Learn about privilege escalation, a security exploit that elevates user access rights, its types, attack methods, risks, and best practices for prevention.

Managing Splunk Add-Ons with UCC Framework

The UCC framework is designed for Splunk users and developers who want to improve their add-on development process and management.
Learn 7 Min Read

RSA Algorithm in Cryptography: Rivest Shamir Adleman Explained

This article describes RSA algorithm, how it works, and its major applications in cryptography. It also explains the vulnerabilities of RSA.
Observability 4 Min Read

Observations from .conf Go: Why Every Business Needs Observability

Raen Lim, Splunk Group Vice President, explains why building robust digital resilience — supported by strong observability — is essential.