false
Watch the .conf25 Global Broadcast on demand
Watch the .conf25 Global Broadcast on demand
Splunk Blogs
Leadership
3 Min Read
Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Industry Insights 3 Min Read

5 Ways AI is Helping the Public Sector Move From “Best Practice” to “Best Fit”

And how that means flexible, nuanced solutions that better protect the people we serve.
Security 11 Min Read

Bypassing the Bypass: Detecting Okta Classic Application Sign-On Policy Evasion

The Splunk Threat Research Team dives into the Okta policy bypass vulnerability, offering detection insights and effective hunting strategies for security teams.
Security 10 Min Read

CosmicSting: A Critical XXE Vulnerability in Adobe Commerce and Magento (CVE-2024-34102)

The Splunk Research Team dissects the technical intricacies of the CosmicSting vulnerability, explores its potential impact on affected systems, and provides detection opportunities and mitigation strategies.
Learn 7 Min Read

What's Moore's Law? Its Impact in 2025

Moore’s law has proved to be an accurate observation for over 50 years. Learn what Moore’s law is and why it matters today
Tips & Tricks 5 Min Read

Tech the Halls - Part 1

In this first blog, we explore how Splunk can make financial planning simpler and smarter. Whether you’re tracking your holiday expenses, identifying spending trends, or preparing for unexpected costs, Splunk equips you with the insights you need to make better financial decisions.
Learn 8 Min Read

What is Network Segmentation? A Complete Guide

Learn how network segmentation enhances security, boosts network performance, and protects critical assets by isolating subnets and limiting cyber threats.
CISO Circle 8 Min Read

Ciso Q&A: Walking the Risk Tightrope to Drive Innovation

Understanding the evolution of threats as generative AI ups the stakes for defenders
Security 10 Min Read

Cracking Braodo Stealer: Analyzing Python Malware and Its Obfuscated Loader

The Splunk Threat Research Team break down Braodo Stealer's loader mechanisms, obfuscation strategies, and payload behavior.
Industries 5 Min Read

Splunk’s Path Towards Achieving FedRAMP Moderate Authorization for Splunk Observability

Splunk VP of Public Sector Bill Rowan shares how we plan on actively pursuing a FedRAMP Moderate authorized Splunk Observability Cloud offering.