false
Leadership
4 Min Read
Splunk's 'The New Rules of Data Management: Creating Value in the AI Era' report captures trending shifts in data management and examines how organizations are structuring — and should be potentially rethinking — their data strategies.

Featured Articles

Security

Learn

Latest Articles

Security 5 Min Read

Are You Forensic Ready?

In the landscape of everyday operations, the concept of forensic readiness may often linger unnoticed in the background.
Security 11 Min Read

Hunting M365 Invaders: Navigating the Shadows of Midnight Blizzard

The Splunk Threat Research Team outlines the attack chain detailed in the Microsoft blog, offering practical detection and hunting tips for cybersecurity defenders.
Tips & Tricks 1 Min Read

New Year, New Ideas, and New Self-Help Articles

Customers at any stage of their organizational resilience journey can benefit from the action-oriented, self-help content available free on Splunk Lantern.
Security 3 Min Read

Supercharge Cybersecurity Investigations with Splunk and Graphistry: A Powerful Combination for Interactive Graph Exploration

In this blog post, we'll dive deeper into how combining Splunk and Graphistry can help you unlock new capabilities for your cybersecurity investigations and gain better resilience for your organization.
Observability 7 Min Read

Custom Metrics and their importance in Observability

Leveraging custom metrics and having complete control into how all metrics are collected and are sent into your O11y platform, is key to managing the complex modern platforms of today (and those of tomorrow!). Read more on the blog.
Industries 6 Min Read

Short Staffed? Try Using SOAR to Augment Your Security Team

Splunk's Frank Myers looks at two industries affected by short staffing – higher education and state and local governments – and explains how Splunk SOAR can help.
Learn 5 Min Read

ISO 27002: Information Security Controls Explained

In this article, we will look at the origin story of the ISO 27002 standard, as well as its structure, and how to apply the guidelines.
Security 6 Min Read

Building Large-Scale User Behavior Analytics: Data Validation and Model Monitoring

Splunk's Cui Lin explores fundamental techniques to validate data volume and monitor models to understand the size of your own UBA clusters.
Learn 10 Min Read

What is Threat Modeling?

Get started with threat modeling today. We’ll define threat modeling, discuss how it works, and share simple and advanced threat modeling frameworks.