false
Leadership
4 Min Read
Splunk's 'The New Rules of Data Management: Creating Value in the AI Era' report captures trending shifts in data management and examines how organizations are structuring — and should be potentially rethinking — their data strategies.

Featured Articles

Security

Learn

Latest Articles

Observability 11 Min Read

Tool Consolidation in the O11y World

Ending up with or having too many tools for monitoring is an age-old problem in the monitoring space. It has been around for decades. In fact I would go a step further and argue that it is much worse within the platforms of today then it was in days gone by. There is a direct correlation between the explosion of new, exciting and innovative technologies and services in modern platform development of today and the sheer volume of tooling you can easily end up with to monitor it. In this blog I explore what has driven the expansion of tools, how having too many is creating fundamental challenges in how these platforms are being managed, the negative impact that this has on innovation and, most importantly, what the solution is.
Observability 3 Min Read

Revolutionize your AppDynamics experience with the new Cisco AI Assistant

Cisco AI Assistant has been integrated into Cisco AppDynamics allowing IT, DevOps, and SRE teams to streamline operations and decision-making processes via the power of intelligent, cross-domain guidance and actionable insights.
Observability 3 Min Read

Cisco builds a unified observability experience between AppDynamics and Splunk

Seamlessly navigate AppDynamics and Splunk with unified observability. Enjoy SSO and context-aware deep linking for faster troubleshooting, improved productivity, and reduced MTTR.
Security 10 Min Read

Deploy, Test, Monitor: Mastering Microsoft AppLocker, Part 2

Leverage the power of Splunk to ingest, visualize, and analyze AppLocker events, enabling you to gain valuable insights and strengthen your organization's security posture.
Security 11 Min Read

Deploy, Test, Monitor: Mastering Microsoft AppLocker, Part 1

The Splunk Threat Research Team provides a comprehensive overview of AppLocker and guidance for getting started with AppLocker policies
Security 6 Min Read

Security Insights: Detecting CVE-2024-4040 Exploitation in CrushFTP

The Splunk Threat Research Team explores how Splunk can help you identify and investigate CVE-2024-4040 exploitation in your CrushFTP environment.
Learn 3 Min Read

The Environmental Impact of AI

Today, AI is everywhere — and it’s powerful. But what powers artificial intelligence? Natural resources like water and electricity. Get the full picture here.
.conf & .conf Go 3 Min Read

Splunk Education, From Live to Live-Stream at .conf24

With Splunk University and .conf24, there's no better time to invest in your professional development and take your Splunk expertise to new heights.
Learn 4 Min Read

Low Code vs. No Code: What’s The Difference?

When it comes to coding and software/app development, two related trends appeal to certain business users: low code and no code programming platforms.