false
Splunk Blogs
Leadership
3 Min Read
Splunk's Kamal Hathi recaps our innovation highlights from .conf25, marking a pivotal moment for Splunk and Cisco as we deliver significant new value to our customers that make the use of AI a practical reality in their organizations.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Security 4 Min Read

Enter the SOC of the Future in Splunk’s State of Security 2025

Splunk's State of Security 2025: The Stronger, Smarter SOC of the Future reveals the insights, aspirations, and challenges of security leaders.
CISO Circle 5 Min Read

Your AI’s Blind Spot is Bigger Than You Think

There are more AI models than ever and not enough visibility. Here’s how to close the gap.
Learn 8 Min Read

Top Cybersecurity Trends in 2025: 9 Trends to Watch

Discover the top cybersecurity trends shaping 2025, highlighting key insights and strategies to help organizations stay resilient.
Observability 4 Min Read

Synthetic Testing Examples: User Flow Testing, APIs Validation, Custom Metrics, Log Ingestion, and More

Introducing a library of Splunk Synthetics examples now available in GitHub, showcasing common flows and concepts for effective Synthetic testing.
Learn 10 Min Read

The Role of SCA in Software Security: The Software Composition Analysis Complete Guide

Learn all about SCA. Software composition analysis is a type of security testing that identifies the open-source and third-party components used in modern software.
Security 4 Min Read

Key Findings From a Recent Study on Data Management in the Modern Security Operations Center

Learn about cloud storage preferences, data cost challenges, and best practices for optimizing your SOC's security posture and cost efficiency.
Observability 4 Min Read

Splunk Delivers Unified Security and Observability to Protect Applications

Unify app security & observability with Splunk to detect real-time attacks, prioritize vulnerabilities, & accelerate threat response.
Security 8 Min Read

Breaking Down Termite Ransomware: Infection Methods and Detections

Deep dive into Termite ransomware: Discover its infection methods, targeted vulnerabilities (like Cleo's CVE-2024-50623), and Splunk security detections.
Tips & Tricks 1 Min Read

Learn Splunk Like You Work Here

Discover a new content type now available on Splunk Lantern that brings more valuable insider knowledge to our customers.