false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Platform 2 Min Read

Dashboard Studio: Your Dashboards, Now Guest-Friendly

Learn how to share your Studio dashboards with the Publish Dashboard feature.
Leadership 4 Min Read

Bridging the Gap: Splunk Helps Students Move from Classroom to Career

Eric Fusilero, VP of Global Enablement and Education, shares how the Splunk Academic Alliance equips students with training, SOC experience, and certifications to launch cybersecurity careers.
Learn 7 Min Read

Top 8 Incident Response Metrics To Know

In this post, we'll cover eight key metrics essential to incident response, including clear definitions and examples.
Learn 9 Min Read

AI Governance in 2025: A Full Perspective on Governance for Artificial Intelligence

In this article, we'll have a look at an overview of AI governance, exploring the key concepts, challenges, and potential solutions.
Observability 2 Min Read

Calling All SREs, DevOps, and Kubernetes Enthusiasts: Join Splunk at KubeCon Europe 2025 in London!

Are you ready to revolutionize your observability game? Mark your calendars for KubeCon + CloudNativeCon Europe 2025, taking place from April 1-4 in Excel Center London. Splunk invites you to visit our booths at N290 & S400 to discover how we're making troubleshooting cool again while helping you shift from reactive to predictive strategies for digital resilience.
Learn 7 Min Read

What Is a Watering Hole Attack? Detection and Prevention

A watering hole attack is a kind of cyberattack, where hackers target websites that are frequently browsed by their target victims.
Learn 10 Min Read

SRE Metrics: Core SRE Components, the Four Golden Signals & SRE KPIs

Get the full story on SRE metrics, including latency, errors, saturation, and traffic, so you can better assess your system's reliability, performance, and efficiency.
Learn 8 Min Read

Key Management in Cryptography: A Complete Introduction

Today, we'll cover encryption key management including a definition and the establishment processes for private & public key cryptography.

Top 7 AI Assistant Use Cases You Can Start Today for Enhanced Observability

Discover the top 7 powerful features of Splunk's AI Assistant for enhanced observability in the Observability Cloud.