false
Registration for .conf25 is open! Join us in Boston September 8–11.
Registration for .conf25 is open! Join us in Boston September 8–11.
Splunk Blogs
Leadership
6 Min Read
Splunk announces innovations across its observability portfolio to provide organizations deeper visibility into their network health through integrations with Cisco, and faster troubleshooting with the help of AI.

Featured Articles

Security

Learn

Latest Articles

Learn 5 Min Read

What Is Attack Surface Management? A Complete Guide To ASM

Understand Attack Surface Management (ASM), explore its 4-step lifecycle, real-world examples, best tools, and how it strengthens your security strategy.
Platform 1 Min Read

Get Involved: Start Contributing to Splunk Technology Add-Ons!

Join the Splunk Technology Add-ons Community Contribution program to help enhance Splunk TAs with bug fixes, features, and improved data onboarding.
Security 2 Min Read

Splunk Security Content for Threat Detection & Response: June Recap

Learn about the latest security content from Splunk.
Security 16 Min Read

When Installers Turn Evil: The Pascal Script Behind Inno Setup Malware Campaign

Uncover the Inno Setup malware campaign leveraging Pascal scripting to deliver RedLine Stealer.
Security 4 Min Read

Threat Hunting with TLS/SSL Certificates

TLS and SSL certificates are a great way to hunt advanced adversaries. Collect them with Splunk Stream, Bro, or Suricata and hunt in your own data!
Learn 6 Min Read

Human in the Loop (HITL) in Practice: A Guide to Core HITL Concepts, Benefits, and Effective AI Collaboration

Learn more about HITL. Human in the Loop is the crucial role of human intervention in an automated or AI-driven process.
Security 6 Min Read

How To Use CloudTrail Data for Security Operations & Threat Hunting

This blog post reviews AWS cloudtrail as a security logging source and how to hunt in it
Security 4 Min Read

Hunting with SA-Investigator & Splunk Enterprise Security (SIEM)

Discover how Splunk Enterprise Security and the SA-Investigator add-on empower analysts to streamline threat hunting and incident response. Learn how to pivot across assets, identities, and processes for deep-dive investigations and actionable insights. Happy hunting!
Security 7 Min Read

Hunting for Threats in VPCFlows

This article will look at native AWS network telemetry — VPCFlows. We’ll explore what it is, how you can ingest it, and what value it provides from a security perspective.