false
Leadership
4 Min Read
Splunk's 'The New Rules of Data Management: Creating Value in the AI Era' report captures trending shifts in data management and examines how organizations are structuring — and should be potentially rethinking — their data strategies.

Featured Articles

Security

Learn

Latest Articles

Security 2 Min Read

Which of Gartner’s 2019 Top 7 Security and Risk Management Trends Are Impacting Your Business? - Part III

Last and final part of our 3-part blog series in which we review Gartner's Security and Risk Trends 2019 and give advise on how to tackle them.
.conf & .conf Go 3 Min Read

SplunkLive! Zurich 2019: Splunk, The Swiss Army Knife for Data

Highlights from the SplunkLive! Zurich 2019 customer speakers
Security 3 Min Read

New: Machine Learning in Splunk Enterprise Security Content Update

Use machine learning techniques to identify outliers in security-related data with a new probability-density function algorithm in Splunk's Machine Learning Toolkit (MLTK)
Security 4 Min Read

Monitor for, Investigate, and Respond to Phishing Payloads with Splunk Enterprise Security Content Update

Detect, investigate, and defend signs of phishing payloads in your environment with Splunk Enterprise Security Content Update (ESCU)
Security 3 Min Read

Boss of the SOC (BOTS) Advanced APT Hunting Companion App: Now Available on Splunkbase

If you want to learn more about threat hunting with Splunk, this app in conjunction with the BOTSv2 data set is just the answer!
Observability 10 Min Read

An Insider’s Guide to Splunk on Containers and Kubernetes | Splunk

An insider’s guide to Splunk on containers and Kubernetes. Our Splunk Enterprise and Universal Forwarder container images on DockerHub are pulled millions of times each month.
Tips & Tricks 3 Min Read

Smooth operator | Searching for multiple field values

With the IN operator, you can specify the field and a list of values.
Security 4 Min Read

Threat Intel and Splunk Enterprise Security Part 2 - Adding Local Intel to Enterprise Security

Splunker John Stoner shares a walkthrough for how to add local threat intelligence into Splunk Enterprise Security