false
Watch the .conf25 Global Broadcast on demand
Watch the .conf25 Global Broadcast on demand
Splunk Blogs
Leadership
3 Min Read
Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Learn 4 Min Read

What Is an Exploit in Cybersecurity?

Exploits are serious business. Learn how they happen — and how to prevent your networks from being exploited — in this in-depth article.
CTO Stack 5 Min Read

Building a Leading Observability Practice Starts With Culture

Discover how leading organizations build resilient observability practices, boost innovation, and foster a culture of excellence. Insights from the State of Observability 2024 report.
Leadership 4 Min Read

APAC in 2025: A Harder Look at AI, Data and Cybersecurity Standards

Splunk's Simon Davies dives into our Splunk Predictions 2025 report and breaks down three key trends that will be pertinent to the APAC region in the year ahead.
Partners 6 Min Read

Leading or Lagging? Three Things That Will Move Observability for Financial Services Forward

Boost IT efficiency, scale faster, and enhance customer experiences with insights from Evolutio and Splunk Observability.
Learn 5 Min Read

Threat Detection, Explained

Threat detection is fundamental to any cybersecurity practice. Learn what this term means and how to get started with it in this article.
Security 2 Min Read

The Modern SIEM Has Come a Long Way From Your Grandmother’s SIEM

Explore how modern SIEM solutions tackle scalability, alert fatigue, and advanced threat detection with automation, machine learning, and real-time insights for efficient SOC workflows.
Tips & Tricks 6 Min Read

Learn SPL Command Types: Efficient Search Execution Order and How to Investigate Them

When performing searches, Splunk uses its own language, SPL (Search Processing Language). In this article, we will explain each type of SPL and show you the efficient order in which to run searches and how to use the Search Job Inspector, an investigative tool.
Learn 6 Min Read

Business Continuity vs. Business Resilience: What's The Difference?

Business resilience is a key trend this year, so let’s outline the differences between business continuity and resilience. Hint: one’s a process, one is much more.
Learn 6 Min Read

RBAC vs. ABAC: Role-Based & Attribute-Based Access Control Compared

Compare RBAC vs ABAC: Learn the pros, cons, and use cases of Role-Based & Attribute-Based Access Control to enhance security and simplify management.