false
Watch the .conf25 Global Broadcast on demand
Watch the .conf25 Global Broadcast on demand
Splunk Blogs
Leadership
3 Min Read
Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Learn 9 Min Read

What Are Distributed Systems?

Distributed systems consist of multiple devices that work together to perform a task that is beyond the capacity of a single system.
Leadership 3 Min Read

2025 Predictions: Driving Digital Resilience Forward

Splunk’s 2025 Predictions explores how organizations can drive digital resilience forward, from advancements in AI to navigating new regulations and everything in between.
Learn 17 Min Read

What Is Process Mining? A Complete Introduction

This in-depth article discusses process mining, including its definition, examples, and how you can get started on process mining implementation for your business.
CTO Stack 4 Min Read

Unlocking OpenTelemetry to Future-Proof Engineering Teams

OpenTelemetry is good for both your engineering team and the business? OTel me more.
Learn 8 Min Read

Top Risk Management Frameworks To Use

This article introduces risk management frameworks and explains the significance of using one in your organization.
Partners 3 Min Read

Reflections from Cisco Partner Summit 2024: Building the Future as One

Cisco Partner Summit 2024 highlighted the growing recognition of Splunk’s critical role in addressing enterprise security and observability challenges.
Learn 8 Min Read

Data Normalization Explained: An In-Depth Guide

Learn how data normalization organizes databases, improves data integrity, supports AI and machine learning, and drives smarter business decisions.
Observability 14 Min Read

DORA, Operational Resilience and Intelligent Observability

DORA brings harmonisation of the rules relating to operational resilience for the financial sector applying to 20 different types of financial entities and ICT third-party service providers and while press discussion (and even the press releases from the EU itself) has emphasised the security dimension of operational resilience, a close reading of the texts associated with the regulation demonstrates an equal if not greater focus on the need for intelligent (i.e. AI enhanced) observability.
Learn 4 Min Read

What is Privilege Escalation? An Introduction

Learn about privilege escalation, a security exploit that elevates user access rights, its types, attack methods, risks, and best practices for prevention.