false
Watch the .conf25 Global Broadcast on demand
Watch the .conf25 Global Broadcast on demand
Splunk Blogs
Leadership
3 Min Read
Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Security 4 Min Read

Paving the Way for Unified Cybersecurity: OCSF Joins the Linux Foundation with Splunk’s Support

Unified cybersecurity takes a step forward as OCSF joins the Linux Foundation, backed by Splunk’s support.
Security 1 Min Read

Splunk Enterprise Security 8.0: Customer Feedback

Splunk Enterprise Security 8.0 delivers unified workflows, alert aggregation, and detection versioning to empower security teams, shaped by customer feedback.
Learn 12 Min Read

AppSec Today: Application Security Requirements & Guidelines To Know

Explore the essential aspects of application security: threats, requirements, and best practices. Learn how to safeguard your applications and data effectively.
Learn 4 Min Read

Recovery Point Objective (RPO) vs. Recovery Time Objective (RTO): What’s The Difference?

For online services and products, availability is the name of the game. Learn what RPO and RTO mean for availability — and how to set them for your organization.
Partners 2 Min Read

Splunk Now Generally Available on Microsoft Azure

Splunk arrives on Microsoft Azure, giving the vast majority of Fortune 2000 companies an easier way to enable enterprise-grade security and observability.
Learn 4 Min Read

What is Cloud Native Application Protection Platform: Everything You Need to Know

Learn what the Cloud Native Application Protection Platform (CNAPP) is and how it works to secure cloud applications.
Splunk Life 3 Min Read

Life as a Software Engineer Intern at Splunk

Discover life as a Splunk Software Engineer intern with Thomas Payton, Juanchi Flores, and Christina Liang.
Learn 10 Min Read

What's The CIA Triad? Confidentiality, Integrity, & Availability, Explained

The CIA security triad guides information security strategies to inform areas like security framework implementation and cyber threat.
Learn 7 Min Read

What Is Risk Assessment? Steps, Types, and Challenges

Learn how to assess risk. See how risk assessments work and help to ensure the security of your digital assets, physical spaces, and your staff.