false
Leadership
4 Min Read
Splunk's 'The New Rules of Data Management: Creating Value in the AI Era' report captures trending shifts in data management and examines how organizations are structuring — and should be potentially rethinking — their data strategies.

Featured Articles

Security

Learn

Latest Articles

Three lessons learnt from the most mature Computer Security Incident Response Team (CSIRT)

Cisco’s CSIRT shared how they are bridging the gaps among business context, cost justification and cyber security by relying on Splunk as their Investigation and Response Platform.
Security 2 Min Read

Punycode phishers - All you need to know

Unicode domains can be used for homograph attacks. Learn what they are and how users can be tricked.
Security 8 Min Read

Splunk and Tensorflow for Security: Catching the Fraudster with Behavior Biometrics

Raising the barrier for fraudsters and attackers: how to leverage Splunk and Deep Learning frameworks to discover Behavior Biometrics patterns within user activities

Operational Intelligence - Manufactured in Germany | SplunkLive! Events in Germany 2017

If you hear stories about how data is analysed from locomotives, placement systems on a shopfloor, automated optical inspection devices (AOI), autonomous indoor vehicles, contact less payment apps (NFC) - you know that you’re at SplunkLive! Germany!
Tips & Tricks 2 Min Read

Build a Dashboard with Dynamic and Editable Inputs

Use some less obvious features of Splunk SimpleXML to create a dynamic but flexible user experience with form inputs.http://docs.splunk.com/Documentation/ES/latest/User/Eventinvestigator
Partners 2 Min Read

Building the next generation of Security Ninjas - ECS is full on with Splunk

A conversation with Harry McLaren, Senior Security Consultant and the Splunk Enablement Lead within ECS.
Tips & Tricks 9 Min Read

Syslog-ng and HEC: Scalable Aggregated Data Collection in Splunk

Best practices for scalable aggregated data collection
Security 2 Min Read

Assigning Role Based Permissions in Splunk Enterprise Security

Learn how to add a new role in Enterprise Security and apply capabilities to it