false
Registration for .conf25 is open! Join us in Boston September 8–11.
Registration for .conf25 is open! Join us in Boston September 8–11.
Splunk Blogs
Leadership
3 Min Read
Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Learn 4 Min Read

Black Hat 2025 & DEF CON 33: The Attendees’ Guide

This blog post covers the basics of what you need to know about both Black Hat USA and Def Con.
Observability 3 Min Read

Splunk Named a Leader in the 2025 Gartner® Magic Quadrant™ for Observability Platforms

Splunk has been named a Leader in the 2025 Gartner® Magic Quadrant™ for Observability Platforms for the third year in a row.
Learn 4 Min Read

Observability as Code: Why You Should Use OaC

Observability as Code (OaC) applies software development practices to observability, making it version-controlled, more consistent, and more secure. Learn more.
Security 13 Min Read

Beyond The Click: Unveiling Fake CAPTCHA Campaigns

Learn how clipboard hijacking delivers malware and explore tools like ClickGrab & PasteEater for robust defense strategies.
Learn 5 Min Read

Unified Threat Management (UTM): The Complete Guide to Modern Cybersecurity Solutions

Discover how Unified Threat Management (UTM) simplifies cybersecurity by integrating multiple security tools to protect your business from evolving threats.
Security 4 Min Read

Splunk @ SAPPHIRE 2025 Recap: How SAP Customers Use Splunk for World-Class Observability and Security

Splunker Keith Hontz shares a look at the Splunk highlights from SAP SAPPHIRE 2025.
Learn 4 Min Read

Understanding Attack Surfaces: What They Are and Why They Matter

Learn what an attack surface is, why it matters, and how organizations can reduce risk by identifying and managing every exposure point, technical or human.
CIO Office 5 Min Read

Data Challenges Pave Way for Creative Strategies

How AI, collaboration, and unified platforms are reshaping the way organizations think about data.
Learn 5 Min Read

What Is Attack Surface Management? A Complete Guide To ASM

Understand Attack Surface Management (ASM), explore its 4-step lifecycle, real-world examples, best tools, and how it strengthens your security strategy.