false
Registration for .conf25 is open! Join us in Boston September 8–11.
Registration for .conf25 is open! Join us in Boston September 8–11.
Splunk Blogs
Leadership
3 Min Read
Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Learn 9 Min Read

What Is Customer Analytics?

Learn how to analyze customer data, improve engagement, boost sales, and gain a competitive edge.
CISO Circle 4 Min Read

(Re-)Building Trust When Security Incidents Occur

How incidents can strengthen relationships and increase resilience
Observability 10 Min Read

Tiered Observability: How To Prioritize and Mature Observability Investments

Tiered observability ensures that your most critical applications receive the depth of monitoring, alerting, and response they require. Learn more here.
CISO Circle 3 Min Read

Want A Bigger Budget? Learn to Think Like a Board

Learn how CISOs can secure bigger budgets by aligning with their boards.
Learn 11 Min Read

IT & System Availability + High Availability: The Ultimate Guide

Learn IT & system availability best practices, high availability strategies, and monitoring techniques to minimize downtime and ensure optimal performance.
Learn 6 Min Read

Change Management for IT: Understanding IT Changes with ITSM and the ITIL® 4 Framework

This blog post covers the basics of change management in all areas of IT - from DevOps to ITIL and more.
Security 4 Min Read

Why Security Teams Choose Splunk Enterprise Security: Three Core Benefits That Transform SecOps

Discover how Splunk Enterprise Security transforms SecOps with comprehensive visibility, contextual threat detection, and efficient operations. Learn from PeerSpot users how this leading SIEM solution enhances security management and improves threat response.
Security 20 Min Read

Infostealer Campaign against ISPs

The Splunk Threat Research Team observed actors performing minimal intrusive operations to avoid detection, with the exception of artifacts created by accounts already compromised.
Learn 9 Min Read

Risk Tolerance vs. Risk Appetite: How To Understand Risk & Determine Your Risk Tolerance and Appetite

Learn about how risk tolerance and risk appetite shape how organizations identify and manage risks in line with wider corporate goals.