false
Watch the .conf25 Global Broadcast on demand
Watch the .conf25 Global Broadcast on demand
Splunk Blogs
Leadership
3 Min Read
Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Learn 8 Min Read

Cybersecurity Frameworks: What They Are & How to Use Them

In this post, we'll cover what a security framework is, why organizations need them, and how organizations can benefit from them.
Industries 2 Min Read

The Rise of Student-Powered Security Operations Centers (SOCs)

Splunker Frank Myers explains how the rise of student-powered SOCs is one of the new, innovative solutions to bolster cybersecurity defenses.
Observability 7 Min Read

Introducing the Observability Center of Excellence: Taking Your Observability Game to the Next Level

The Observability Center of Excellence (CoE) helps simplify and streamline your strategy and provides a framework to maintain and mature a leading observability practice.
Security 3 Min Read

Cybersecurity Awareness Is Not Just for Spooky Season

As October marks Cybersecurity Awareness Month, Splunker Mick Baccio reflects on the progress made over the past two decades.
Learn 4 Min Read

Introduction to Runbooks

Runbooks provide step-by-step IT guidelines, streamlining tasks, reducing errors, and enhancing efficiency, consistency, and automation in daily operations.
Learn 7 Min Read

What Is SecOps? Security Operations Defined

Security Operations, or SecOps, covers practically every aspect of security & IT operations. Get the latest on what SecOps means today, all right here.
Learn 5 Min Read

Security for Industrial Control Systems (ICS)

Industrial Control Systems (ICS) Security is defined as the defense of systems that govern industrial processes. Get the full picture here.
CISO Circle 4 Min Read

Why It’s Important to Brush Your Teeth: Refocusing on Cybersecurity Fundamentals in the Era of AI

Why basic cyber hygiene gets overlooked — and why we can't afford to any longer.
Learn 5 Min Read

An Introduction to Threat Monitoring

Discover threat monitoring, its importance in combating rising cyber risks, top tools, best practices, and how AI enhances real-time protection for your business.