false
Watch the .conf25 Global Broadcast on demand
Watch the .conf25 Global Broadcast on demand
Splunk Blogs
Leadership
3 Min Read
Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Learn 5 Min Read

What Are Cron Jobs?

Cron jobs are unattended programs that schedule tasks automatically on computer servers, ensuring that important, routine digital chores get done.
CISO Circle 1 Min Read

How to Speak Board: A Primer for CISOs

To navigate relationships with board members, start by understanding each member's background and unique concerns.
Observability 11 Min Read

Tool Consolidation in the O11y World

Ending up with or having too many tools for monitoring is an age-old problem in the monitoring space. It has been around for decades. In fact I would go a step further and argue that it is much worse within the platforms of today then it was in days gone by. There is a direct correlation between the explosion of new, exciting and innovative technologies and services in modern platform development of today and the sheer volume of tooling you can easily end up with to monitor it. In this blog I explore what has driven the expansion of tools, how having too many is creating fundamental challenges in how these platforms are being managed, the negative impact that this has on innovation and, most importantly, what the solution is.
Observability 3 Min Read

Cisco builds a unified observability experience between AppDynamics and Splunk

Seamlessly navigate AppDynamics and Splunk with unified observability. Enjoy SSO and context-aware deep linking for faster troubleshooting, improved productivity, and reduced MTTR.
Security 10 Min Read

Deploy, Test, Monitor: Mastering Microsoft AppLocker, Part 2

Leverage the power of Splunk to ingest, visualize, and analyze AppLocker events, enabling you to gain valuable insights and strengthen your organization's security posture.
Security 11 Min Read

Deploy, Test, Monitor: Mastering Microsoft AppLocker, Part 1

The Splunk Threat Research Team provides a comprehensive overview of AppLocker and guidance for getting started with AppLocker policies
Security 6 Min Read

Security Insights: Detecting CVE-2024-4040 Exploitation in CrushFTP

The Splunk Threat Research Team explores how Splunk can help you identify and investigate CVE-2024-4040 exploitation in your CrushFTP environment.
Learn 3 Min Read

The Environmental Impact of AI

Today, AI is everywhere — and it’s powerful. But what powers artificial intelligence? Natural resources like water and electricity. Get the full picture here.
.conf & .conf Go 3 Min Read

Splunk Education, From Live to Live-Stream at .conf24

With Splunk University and .conf24, there's no better time to invest in your professional development and take your Splunk expertise to new heights.