false
Leadership
4 Min Read
Splunk's 'The New Rules of Data Management: Creating Value in the AI Era' report captures trending shifts in data management and examines how organizations are structuring — and should be potentially rethinking — their data strategies.

Featured Articles

Security

Learn

Latest Articles

Learn 5 Min Read

Black Hat & DEF CON: 2024 Wrap-Up & 2025 Preview

This blog post covers the basics of what you need to know about both Black Hat USA and Def Con.
Learn 6 Min Read

What Is IoT Security? A Complete Overview

IoT security is a threat protection mechanism and cybersecurity strategy that defends IoT devices against vulnerabilities.
Tips & Tricks 4 Min Read

Dashboard Studio: Tabbed Dashboards

In Splunk Cloud Platform 9.2.2406, Dashboard Studio introduces a number of new features that will streamline and improve your dashboard designing experience.
Learn 7 Min Read

Phishing Attacks: Protecting Against Them

Phishing attacks exploit social engineering to deceive victims into disclosing sensitive information or installing malware.
Learn 7 Min Read

SBOMs: Software Bill of Materials, Explained

The software bill of materials (SBOM) lists all component parts and software dependencies used in application development and delivery.
Security 17 Min Read

Handala’s Wiper: Threat Analysis and Detections

Cisco Talos and the Splunk Threat Research Team provide a comprehensive analysis that expands on existing coverage of Handala's Wiper and offers unique insights.
Global Impact 3 Min Read

Impact Bytes: Turning Data to Action to Fight Exploitation

Global Emancipation Network and Splunk use innovative data and AI solutions to rescue victims and change lives.
Global Impact 4 Min Read

London to Paris Cycle for Prostate Cancer - Day 3

After days of battling the elements, technical glitches, and plenty of laughs along the way, our incredible team of Splunkers has arrived at the Eiffel Tower and managed to complete their bike ride. Read all about it here.
Industries 2 Min Read

Expert Guidance for Fraud Detection and Prevention

Splunker Beverly Smart explains why your organization must be prepared to defend against fraud across your technical infrastructure.