Splunk announces innovations across its observability portfolio to provide organizations deeper visibility into their network health through integrations with Cisco, and faster troubleshooting with the help of AI.
Splunk's 'The New Rules of Data Management: Creating Value in the AI Era' report captures trending shifts in data management and examines how organizations are structuring — and should be potentially rethinking — their data strategies.
Remote Employment Fraud actors don’t steal credentials—they’re issued them. This blog explores early detection and why security can’t face this threat alone.
The latest articles from Splunk, straight to your inbox
Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Learn how Splunk Global Security runs ops at scale and enables the business by focusing on what matters—solving problems through data, automation, and collaboration.
Large language models have changed the world. What about small language models? Learn what SLMs are, how they differ from LLMs, and why SLMs are the future.
Telemetry is powerful data that can tell you all sorts of important information. Know what you can do with this useful data — get the full telemetry 101 here.
The tradition continues! We are happy to announce that the Boss of the SOC (BOTS) v3 dataset has been released under an open-source license and is available for download.
Explore the various instrumentation approaches to building a robust observability strategy for your Node applications with Splunk Infrastructure Monitoring.
Splunk CEO, Doug Merritt, explains how we're bringing data to the novel coronavirus crisis with the publicly available interactive Splunk COVID-19 Dashboard
Splunk Infrastructure Monitoring's Windows Smart Agent provides people with the same automatic discovery and configuration capabilities delivered by its Linux-based counterpart, while also making it easier to monitor metrics that are unique to Windows environments.
Taking a look at the World Economic Forum (WEF) in Davos 2020 from a cybersecurity angle. What technology risks should we be prepared for according to the WEF?