false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Learn 8 Min Read

Key Management in Cryptography: A Complete Introduction

Today, we'll cover encryption key management including a definition and the establishment processes for private & public key cryptography.
Observability 5 Min Read

Customers Increasingly Choose Splunk for Observability

In this blog post, learn what makes Splunk Observability different from other industry solutions like New Relic.
Learn 7 Min Read

What Is Machine Data? A Complete Intro To Machine Data, For Humans

In this post, we'll discuss what machine data is, how it’s used, common examples of machine data, and why it’s important.
Security 5 Min Read

Onboarding Windows Events to Powershell Threat Detection in UBA

Learn how to enhance PowerShell threat detection in UBA by effectively onboarding Windows events. Our step-by-step guide covers XML event log formats and Splunk integration, ensuring robust security against cyber threats.
Learn 8 Min Read

What Is a Data Platform? A Complete Introduction

Let’s take a deep look at data platforms, including the definition, the benefits and use cases, and how to start building your data strategy.
Learn 3 Min Read

What Is DNS? Domain Name Service, Explained

DNS is the address book for the internet. Learn how the behind-the-scenes Domain Name System powers every single webpage you visit.
Security 14 Min Read

Hey SDDL SDDL: Breaking Down Windows Security One ACE at a Time

Explore SDDL in Windows security with our comprehensive guide to help enhance your defensive strategy against privilege escalation attacks.
Learn 7 Min Read

LLMs vs. SLMs: The Differences in Large & Small Language Models

Today’s language models are powering ChatGPT and other popular AIs. Learn the differences between LLMs and SLMs in this detailed article.
Platform 11 Min Read

Clara-fication: Data Onboarding Best Practices

The Splunk Security Center of Excellence outlines best practices they follow to bring data into Splunk.