Skip to main content
false

Chrissy Kidd

Chrissy Kidd is a technology writer, editor, and speaker based in Baltimore. The managing editor for Splunk Learn, Chrissy has covered a variety of tech topics, including ITSM & ITOps, software development, sustainable technology, and cybersecurity. Previous work includes BMC Software, Johns Hopkins Bloomberg School of Public Health, and several start-ups. She's particularly interested in how tech intersects with our daily lives. 

Learn 9 Min Read

What Are Distributed Systems?

Distributed systems consist of multiple devices that work together to perform a task that is beyond the capacity of a single system.
Learn 8 Min Read

Data Normalization Explained: An In-Depth Guide

Data normalization is simply a way to reorganize clean data so it’s easier for users to work with and query. Learn more here.
Learn 10 Min Read

What's The CIA Triad? Confidentiality, Integrity, & Availability, Explained

The CIA security triad guides information security strategies to inform areas like security framework implementation and cyber threat.
Learn 10 Min Read

What Is InfoSec? Information Security Explained

In this post, we'll provide an introduction to information security including how to assess InfoSec vulnerability and best practices.
Learn 11 Min Read

What Is Distributed Tracing?

When your IT systems, apps, and software are spread out, you need a way to see what’s happening across all these. Learn how distributed tracing can help.
Learn 14 Min Read

What Is Incident Response?

In this post, we'll cover what incident response is and why it's essential for organizations to protect themselves from digital threats.
Learn 14 Min Read

What Is Root Cause Analysis? The Complete RCA Guide

In this article, we'll explore how to conduct RCA, its core principles, best practices, and the tools available to facilitate this process.
Learn 11 Min Read

Data Encryption Methods & Types: A Beginner's Guide

In this article, we'll discuss data encryption methods including symmetric and asymmetric encryption, common algorithms, and best practices.
Learn 6 Min Read

What Is Multimodal AI? A Complete Introduction

This article explains what Multimodal AI is and examines how it works, its benefits, and its challenges.
Learn 6 Min Read

6 Vulnerability Types You Need To Know

Knowing where and how vulnerabilities can exist, you can start to get ahead of them. Let’s look at the six most important vulnerability types.
Learn 8 Min Read

Cybersecurity Frameworks: What They Are & How to Use Them

In this post, we'll cover what a security framework is, why organizations need them, and how organizations can benefit from them.
Learn 8 Min Read

Data Quality & Data Quality Management (DQM)

In the data age, you must ensure your data is quality data. Learn what that means, and how to achieve it with data quality management.
Learn 8 Min Read

What's GRC? Governance, Risk & Compliance Explained

GRC ensures organizations meet third-party requirements while still hitting high-performance goals. Learn what it is and how to implement it.
Learn 10 Min Read

Cyber Kill Chains: Strategies & Tactics

A cyber kill chain framework helps you understand and combat attacks. Learn about the evolution and applications of the cyber kill chain.
Learn 6 Min Read

What's a Firewall? The Complete Guide

Learn about firewalls, including how it works, and the popular types of firewalls. Also, check out some of the best practices for choosing firewalls.
Learn 7 Min Read

What Are Social Engineering Attacks? A Detailed Explanation

In this post, we'll explore how cybercriminals use a variety of tactics and understand how to defend against social engineering attacks.
Learn 6 Min Read

Vulnerabilities, Threats & Risk Explained

Vulnerability, threat, risk: These terms are frequently used together, but they do explain three separate components of cybersecurity?
Learn 6 Min Read

What Is Load Balancing?

Load Balancing is the process of distributing network traffic among available servers, with the objective of optimizing certain network operations.
Learn 5 Min Read

What Are Feedback Loops?

Today, feedback loops are commonplace in IT, business, and plenty of other domains, too. But what exactly are they meant to do — and how do they work?
Learn 5 Min Read

Failure Metrics & KPIs for IT Systems

Failure metrics: a terrible name for a set of very useful metrics. If you're involved in uptime & reliability for IT systems, then read on to learn all about MTTR, MTBF, failure rates and more!
Learn 7 Min Read

Internet Trends in 2025: Mary Meeker, Stats, & Predictions

If no one documents trends, did they happen? Luckily, we don’t have to pretend! We’re covering Mary Meeker to find out what happened to her internet trends.