false
Leadership
4 Min Read
Splunk's 'The New Rules of Data Management: Creating Value in the AI Era' report captures trending shifts in data management and examines how organizations are structuring — and should be potentially rethinking — their data strategies.

Featured Articles

Security

Learn

Latest Articles

Security 5 Min Read

Splunk SOAR Evolved: A Unified TDIR Approach to Automation

Splunk SOAR 6.3.0 and 6.3.1 constitute a significant evolution in how security practitioners can implement, use, and leverage security automation in the SOC more efficiently.
Learn 7 Min Read

Maximum Acceptable Outage (MAO) Explained

Learn how Maximum Acceptable Outage (MAO) helps organizations minimize downtime and ensure business continuity.

Splunk Technical Experts Help Drive Business Outcomes

Splunk technical experts help drive value for customers by enhancing applications, integrations, and business outcomes.
Learn 6 Min Read

What Is Authorization?

Authorization is the process of deciding what actions, parts of a website, or application a given user can access after they have been authenticated.
Learn 8 Min Read

SRE vs. DevOps vs. Platform Engineering: Differences Explained

This article explains SRE vs DevOps vs Platform Engineering, including similarities and differences, and more.

What is a Splunk ‘Aha’ Moment?

Helping our customers be successful in any action, transaction or insight with Splunk is our 'aha' moment every minute of every day.
Splunk Life 3 Min Read

August 2024 Living Our Values Award Winners

Learn about the Splunkers who embody our core values of innovative, passionate, disruptive, open, and fun!
Learn 8 Min Read

Cybersecurity Awareness Month 2024: The Complete Guide

Cybersecurity Awareness Month is an annual initiative observed every October. Get the full details for October 2024.
Learn 8 Min Read

What Is Threat Hunting?

The goal of threat hunting is not only to find more security incidents but to improve automated detection capabilities over time. Learn how and why.