Skip to main content
false
Leadership
6 min read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

Security

Security
3 min read
Announcing the availability of Cisco Talos Incident Response services to Splunk customers.
Security 8 Min Read

Observability Meets Security: Build a Baseline To Climb the PEAK

Splunker James Hodgkinson looks at how to apply the baseline hunting process to some common O11y data sources and shows how the OpenTelemetry standard offers easier data analysis.
Security 11 Min Read

LLM Security: Splunk & OWASP Top 10 for LLM-based Applications

Threats to LLMs are real. Let’s look at top LLM threats and show you how, with Splunk, you can better defend LLM-based applications and their users.
Security 3 Min Read

Comprehensive, Continuous, and Compliant: Obtain Proactive Insights with Splunk Asset and Risk Intelligence

Announcing the release of the latest addition to our security product portfolio, Splunk Asset and Risk Intelligence.
Security 2 Min Read

Announcing General Availability of Cisco Talos Intelligence in Splunk Attack Analyzer

We are pleased to announce the general availability of Cisco Talos threat intelligence to all Splunk Attack Analyzer customers globally.

Learn

Latest Articles

Global Impact 4 Min Read

London to Paris Cycle for Prostate Cancer - Day 2

Our Splunkers are officially two days into their epic journey from London to Paris, and what a day it was! With sore legs, aching muscles, and a few bumps along the way, the riders are now in full swing with the end in sight as they navigate the beautiful countryside of France. Read more about the events of Day 2 here.
Learn 6 Min Read

Fusion Teams: What Are They?

Fusion teams, also known as cross-functional or interdisciplinary teams, come together to work on a specific project or initiative. Get the full story here.
Learn 7 Min Read

Redundancy vs. Resiliency in IT: What’s The Difference?

In IT systems, redundancy and resiliency are often talked about together and you can’t have one without the other. Get the full story here.
Global Impact 3 Min Read

London to Paris Cycle for Prostate Cancer - Day 1

The team of brave Splunkers set out from Splunks Paddington office in London, embarking on their three-day, 375-kilometer journey to Paris, all in the name of raising awareness and funds for Prostate Cancer UK. Read all about Day 1here on Splunk Blogs.
Security 8 Min Read

The Final Shell: Introducing ShellSweepX

The Splunk Threat Research Team is excited to announce the final tool in the ShellSweep collection: ShellSweepX.
Learn 6 Min Read

The Caesar Cipher, Explained

The Caesar Cipher is among the oldest encryption techniques used to communicate securely. It’s simple to use and easy to break, as you’ll see here.
Industries 2 Min Read

Splunk SOAR Has Attained FedRAMP Moderate Authorization

Splunk SOAR has received Federal Risk and Authorization Management Program (FedRAMP) Agency Authorization at the Moderate impact level.
Learn 6 Min Read

Intrusion Detection Systems (IDS): Definition, Types, Purpose

An intrusion detection system monitors network traffic for anomalies and cyberattacks. Learn what types of IDS there are and which is right for you.
Learn 5 Min Read

RBAC: Role-Based Access Controls, Explained

Learn how role-based access controls restrict users to their roles and secure confidential data.