false
Splunk Blogs
Leadership
6 Min Read
Splunk announces innovations across its observability portfolio to provide organizations deeper visibility into their network health through integrations with Cisco, and faster troubleshooting with the help of AI.

Featured Articles

Security

Learn

Latest Articles

Security 7 Min Read

Ghost in the Web Shell: Introducing ShellSweep

Splunk introduces ShellSweep, a suite of utilities designed to detect and combat malicious web shells in servers.
Learn 4 Min Read

Endpoints and Endpoint Detection: Importance & Risk Mapping

Endpoints sound like an afterthought...not like the most important part of your cybersecurity posture. Learn what endpoints are, and why detecting them is so important.
Learn 6 Min Read

Endpoint Security Explained

Discover the role of endpoint security in protecting network integrity. This guide shares insights into implementing robust security measures for effective cyber defense.
Learn 4 Min Read

What is a Computer Server?

Computer servers do indeed serve: they serve up compute power and data! Get the full server story in this in-depth article.
Learn 7 Min Read

Continuous Threat Exposure Management (CTEM)

Attack surfaces changing daily? Cyber threats on the rise? Old ways of working ain't cutting it? CTEM may be your cyber solution. Get the full story here.
Learn 6 Min Read

The SaaS Security Guide: Best Practices for Securing SaaS

In this article, let’s look at SaaS security: what it is, the most common threats to SaaS and actionable best practices for securing SaaS applications.
Security 17 Min Read

Hunting M365 Invaders: Blue Team's Guide to Initial Access Vectors

Discover insights from the Splunk Threat Research Team on Microsoft 365 threat detection, focusing on data source analysis and effective methods for hunting initial access threats.
Observability 5 Min Read

The Importance of Traces for Modern APM [Part 2]

In the second part of this blog we will explore how increased entropy forces us to rethink what is required for monitoring.
Learn 6 Min Read

Google Dorking: An Introduction for Cybersecurity Professionals

In this blog post, we'll take a look at the basics of Google Dorking (AKA Google Hacking), how it can impact your organization, and steps you can take to mitigate this risk.