false
Splunk Blogs
Observability
3 Min Read
Splunk releases its newest report, State of Observability 2025: The Rise of a New Business Catalyst.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Splunk Life 2 Min Read

Life as a Product Management Intern: Austin Wilson

Product Management Intern Austin Wilson shares his experience at Splunk, working remotely from Boulder, CO while giving back and using Splunk for good.
Learn 7 Min Read

Hacking 101: Black Hat vs. White Hat vs. Gray Hat Hacking

What's the difference between black hat, white hat, and gray hat? Read on to learn about these hacking categories.
Learn 14 Min Read

What Is Incident Response?

In this post, we'll cover what incident response is and why it's essential for organizations to protect themselves from digital threats.
Security 12 Min Read

ValleyRAT Insights: Tactics, Techniques, and Detection Methods

The Splunk Threat Research Team conducts an analysis for several variants of ValleyRAT’s malware samples to extract its MITRE ATT&CK tactics, techniques, and procedures (TTPs).
Learn 12 Min Read

Cybersecurity Threats: What They Are & How They Work Today

In this article, we discuss cybersecurity threats including how they've evolved, common threats, and the best practices to deal with them.
Learn 6 Min Read

Offensive vs. Defensive Security: What's The Difference?

Learn the difference between offensive and defensive security, who does what and when. Then, we'll explore the challenges inherent in both.
Learn 6 Min Read

Security Event Logs: A Complete Introduction

See why security event logs are so important: they provide real-time insights to protect your online data from threats or breaches.
Learn 14 Min Read

What Is Root Cause Analysis? The Complete RCA Guide

In this article, we'll explore how to conduct RCA, its core principles, best practices, and the tools available to facilitate this process.
Learn 6 Min Read

The Forensic Investigator Role: Skills and Responsibilities

Uncover how forensic investigators interpret and assess crimes and frauds to help companies strengthen their security.