false
Splunk Blogs
Observability
3 Min Read
Splunk releases its newest report, State of Observability 2025: The Rise of a New Business Catalyst.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Learn 9 Min Read

IT Operations Management (ITOM): A Detailed Introduction

Learn how ITOM enhances operations, improves service delivery, and differentiates from ITSM, ITIL, and ITAM.
Industry Insights 3 Min Read

5 Ways AI is Helping the Public Sector Move From “Best Practice” to “Best Fit”

And how that means flexible, nuanced solutions that better protect the people we serve.
Security 11 Min Read

Bypassing the Bypass: Detecting Okta Classic Application Sign-On Policy Evasion

The Splunk Threat Research Team dives into the Okta policy bypass vulnerability, offering detection insights and effective hunting strategies for security teams.
Security 10 Min Read

CosmicSting: A Critical XXE Vulnerability in Adobe Commerce and Magento (CVE-2024-34102)

The Splunk Research Team dissects the technical intricacies of the CosmicSting vulnerability, explores its potential impact on affected systems, and provides detection opportunities and mitigation strategies.
Learn 7 Min Read

What's Moore's Law? Its Impact in 2025

Moore’s law has proved to be an accurate observation for over 50 years. Learn what Moore’s law is and why it matters today
Tips & Tricks 5 Min Read

Tech the Halls - Part 1

In this first blog, we explore how Splunk can make financial planning simpler and smarter. Whether you’re tracking your holiday expenses, identifying spending trends, or preparing for unexpected costs, Splunk equips you with the insights you need to make better financial decisions.
Learn 8 Min Read

What is Network Segmentation? A Complete Guide

Learn how network segmentation enhances security, boosts network performance, and protects critical assets by isolating subnets and limiting cyber threats.
CISO Circle 8 Min Read

Ciso Q&A: Walking the Risk Tightrope to Drive Innovation

Understanding the evolution of threats as generative AI ups the stakes for defenders
Security 10 Min Read

Cracking Braodo Stealer: Analyzing Python Malware and Its Obfuscated Loader

The Splunk Threat Research Team break down Braodo Stealer's loader mechanisms, obfuscation strategies, and payload behavior.