false
Splunk Blogs
Observability
3 Min Read
Splunk releases its newest report, State of Observability 2025: The Rise of a New Business Catalyst.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

CISO Circle 4 Min Read

A CISO’s Guide to Generative AI Policy

Generative AI adoption is rapidly accelerating, akin to the gold rush era’s excitement, but many organizations lack the necessary policies to manage its risks. Recent findings reveal a critical gap in acceptable usage policies, underscoring the need for CISOs to develop adaptable guidelines that balance innovation with security and compliance.
Learn 5 Min Read

Remote Code Execution (RCE) Explained in Detail

Remote code execution (RCE) attacks are a significant threat to organizations. Let's discuss more about RCE in this post.
Platform 4 Min Read

Introducing Splunk Cloud App Export

Splunker Spencer Baker introduces Splunk Cloud App Export, a game-changer for cloud admins and app developers.
CIO Office 5 Min Read

Resilient Paths: How Women in Tech Navigate Challenges and Succeed

Through stories of perseverance, self-advocacy, and mentorship, explores how women in technology, particularly women of color, navigate challenges and break barriers to become influential leaders shaping the industry's future.
Learn 5 Min Read

ITOM vs. ITSM: IT Operations Management & IT Service Management

ITOM and ITSM both help your IT teams to better manage and deliver IT services to the business. What’s the difference? Get the full story here.
Security 4 Min Read

Staff Picks for Splunk Security Reading July 2024

Welcome to the Splunk staff picks blog, featuring a curated list of presentations, whitepapers, and customer case studies that our Splunk security experts feel are worth a read.
CISO Circle 3 Min Read

Embracing the Chaos: How Real Downtime Drills Build Resilient Organizations

Learn how chaos engineering builds resilient systems by simulating real downtime. Strengthen your organization's response to unexpected failures.
Learn 6 Min Read

Structured, Unstructured & Semi-Structured Data

An effective data management strategy is focused on the security, and transparency of structured, unstructured, and semi-structured data.
Learn 6 Min Read

Vulnerabilities, Threats & Risk Explained

Vulnerability, threat, risk: These terms are frequently used together, but they do explain three separate components of cybersecurity?