Splunk announces innovations across its observability portfolio to provide organizations deeper visibility into their network health through integrations with Cisco, and faster troubleshooting with the help of AI.
Splunk's 'The New Rules of Data Management: Creating Value in the AI Era' report captures trending shifts in data management and examines how organizations are structuring — and should be potentially rethinking — their data strategies.
Remote Employment Fraud actors don’t steal credentials—they’re issued them. This blog explores early detection and why security can’t face this threat alone.
The latest articles from Splunk, straight to your inbox
Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Learn how Splunk Global Security runs ops at scale and enables the business by focusing on what matters—solving problems through data, automation, and collaboration.
Large language models have changed the world. What about small language models? Learn what SLMs are, how they differ from LLMs, and why SLMs are the future.
Telemetry is powerful data that can tell you all sorts of important information. Know what you can do with this useful data — get the full telemetry 101 here.
In this second installment we will continue to use the Coburg Intrusion Detection Data Sets (CIDDS) to determine baseline behaviour for one of the nodes we identified as critical in the first half of this series.
This is part three in a three part series on the Asset & Identity framework in Splunk Enterprise Security, focusing providing additional visibility and context to analysts with a notable event.
Do not underestimate the power of great glass table design. Splunk EMEA Director of Product Marketing Stephane Estevez compiled 10 top tips on how you can step up your glass table game.
This is part two in a three part series on the Asset & Identity framework in Splunk Enterprise Security, focusing on adding additional field or attributes to further contextualize systems being monitored.
It’s a whole new world we’re living in, at least for now. This little tutorial will help you stay on top of your security game while in the world of Enterprise Security.