false
Leadership
4 Min Read
Splunk's 'The New Rules of Data Management: Creating Value in the AI Era' report captures trending shifts in data management and examines how organizations are structuring — and should be potentially rethinking — their data strategies.

Featured Articles

Security

Learn

Latest Articles

Learn 4 Min Read

Recovery Point Objective (RPO) vs. Recovery Time Objective (RTO): What’s The Difference?

For online services and products, availability is the name of the game. Learn what RPO and RTO mean for availability — and how to set them for your organization.
Partners 2 Min Read

Splunk Now Generally Available on Microsoft Azure

Splunk arrives on Microsoft Azure, giving the vast majority of Fortune 2000 companies an easier way to enable enterprise-grade security and observability.
Learn 4 Min Read

What is Cloud Native Application Protection Platform: Everything You Need to Know

Learn what the Cloud Native Application Protection Platform (CNAPP) is and how it works to secure cloud applications.
Splunk Life 3 Min Read

Life as a Software Engineer Intern at Splunk

Discover life as a Splunk Software Engineer intern with Thomas Payton, Juanchi Flores, and Christina Liang.
Learn 10 Min Read

What's The CIA Triad? Confidentiality, Integrity, & Availability, Explained

The CIA security triad guides information security strategies to inform areas like security framework implementation and cyber threat.
Learn 7 Min Read

What Is Risk Assessment? Steps, Types, and Challenges

Learn how to assess risk. See how risk assessments work and help to ensure the security of your digital assets, physical spaces, and your staff.
Security 1 Min Read

Introducing Wayfinder: Simplify Your Navigation in Splunk SOAR

Introducing Wayfinder, a new Splunk SOAR feature that streamlines navigation across the user interface and puts important data right at your fingertips.
Learn 10 Min Read

What Is InfoSec? Information Security Explained

In this post, we'll provide an introduction to information security including how to assess InfoSec vulnerability and best practices.
Learn 11 Min Read

What Is Distributed Tracing?

When your IT systems, apps, and software are spread out, you need a way to see what’s happening across all these. Learn how distributed tracing can help.