false
Splunk Blogs
Leadership
3 Min Read
Splunk's Kamal Hathi recaps our innovation highlights from .conf25, marking a pivotal moment for Splunk and Cisco as we deliver significant new value to our customers that make the use of AI a practical reality in their organizations.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

How to Use Splunk to Monitor Security of Local LLMs (Part II)

Learn how to use Splunk to monitor and defend your local Large Language Models (LLMs).
Observability 4 Min Read

What’s New With AppDynamics 25.4

Enhance troubleshooting and streamline operations with AppDynamics 25.4, leveraging new features like tagging, anomaly detection, and Session Replay to optimize performance.
Learn 4 Min Read

What Is Extortionware? Going Beyond Ransomware

Learn what extortionware is, how it works, its impact, and how to protect your business from data leaks and reputational damage.

Accelerating Security Operations with Splunk and Foundation AI’s First Open-Source Security Model

Cisco Foundation AI’s Foundation-sec-8b model brings a new wave of innovations and efficiency to security operations. As a purpose-built, open-weight Large Language Model (LLM) designed specifically for cybersecurity, Foundation-sec-8b enables security teams to act faster, reduce fatigue, and scale operations without compromising accuracy.

How To Use Splunk To Monitor Security of Local LLMs (Part I)

Learn how to use Splunk to monitor the security of local Large Language Models (LLMs) like Llama and GPT4ALL.
Learn 6 Min Read

Cloud Cost Management & Trends in 2025: Strategies to Optimize Your Cloud Spend

Managing cloud costs isn’t easy. But it can be a lot simpler if you follow these expert tips and tools. Get the full story here.
Learn 6 Min Read

LLM Monitoring: A Comprehensive Guide on the Whys & Hows of Monitoring Large Language Models

Discover the ultimate guide to monitoring Large Language Models (LLMs). Learn the whys, hows, key metrics, and strategies for safe and reliable performance.
Learn 8 Min Read

What is Predictive Modeling? An Introduction

Learn the fundamentals of predictive modeling, its role in analytics, and its applications in IT, cybersecurity, business, and advanced machine learning.
Security 14 Min Read

Securing the Network Edge: Cisco Secure Firewall Threat Defense Detections for Splunk

Enhance your network security with Cisco Firepower Threat Defense and Splunk using out-of-the-box detections developed by Splunk's Threat Research Team.