false

Chrissy Kidd

Chrissy Kidd is a technology writer, editor, and speaker based in Baltimore. The managing editor for Splunk Learn, Chrissy has covered a variety of tech topics, including ITSM & ITOps, software development, sustainable technology, and cybersecurity. Previous work includes BMC Software, Johns Hopkins Bloomberg School of Public Health, and several start-ups. She's particularly interested in how tech intersects with our daily lives. 

Learn 7 Min Read

SCADA Systems: What They Are & How They Work

SCADA is a common industrial control system. Let’s understand how SCADA systems work, including the various components, and also look at the challenges today.
Learn 10 Min Read

Zero Trust & Zero Trust Network Architecture (ZTNA), Explained

Let's break down the popular zero trust security concept and look at how to get started with ZTNA: zero trust network architecture.
Learn 5 Min Read

The Very Best Cybersecurity Podcasts To Listen To in 2025

Discover the top cybersecurity podcasts today, offering gripping stories, practical insights, and breaking news. Tune in and stay informed.
Learn 9 Min Read

DevOps Monitoring: What It Is & How It Works

DevOps monitoring involves tracking and measuring app performance to help you identify and resolve issues faster. Learn how it works here.
Learn 9 Min Read

What Are Distributed Systems?

Distributed systems consist of multiple devices that work together to perform a task that is beyond the capacity of a single system.
Learn 8 Min Read

Data Normalization Explained: An In-Depth Guide

Data normalization is simply a way to reorganize clean data so it’s easier for users to work with and query. Learn more here.
Learn 6 Min Read

2025 Cybersecurity Trends: 7 Trends to Watch

Calling all CISOs, security pros & anyone into security: Be prepared (and know how to prepare) for the biggest cyber threats and trends today.
Learn 10 Min Read

What's The CIA Triad? Confidentiality, Integrity, & Availability, Explained

The CIA security triad guides information security strategies to inform areas like security framework implementation and cyber threat.
Learn 10 Min Read

What Is InfoSec? Information Security Explained

In this post, we'll provide an introduction to information security including how to assess InfoSec vulnerability and best practices.
Learn 11 Min Read

What Is Distributed Tracing?

When your IT systems, apps, and software are spread out, you need a way to see what’s happening across all these. Learn how distributed tracing can help.
Learn 14 Min Read

What Is Incident Response?

In this post, we'll cover what incident response is and why it's essential for organizations to protect themselves from digital threats.
Learn 14 Min Read

What Is Root Cause Analysis? The Complete RCA Guide

In this article, we'll explore how to conduct RCA, its core principles, best practices, and the tools available to facilitate this process.
Learn 11 Min Read

Data Encryption Methods & Types: A Beginner's Guide

In this article, we'll discuss data encryption methods including symmetric and asymmetric encryption, common algorithms, and best practices.
Learn 6 Min Read

What Is Multimodal AI? A Complete Introduction

This article explains what Multimodal AI is and examines how it works, its benefits, and its challenges.
Learn 6 Min Read

6 Vulnerability Types You Need To Know

Knowing where and how vulnerabilities can exist, you can start to get ahead of them. Let’s look at the six most important vulnerability types.
Learn 8 Min Read

Cybersecurity Frameworks: What They Are & How to Use Them

In this post, we'll cover what a security framework is, why organizations need them, and how organizations can benefit from them.
Learn 8 Min Read

Data Quality & Data Quality Management (DQM)

In the data age, you must ensure your data is quality data. Learn what that means, and how to achieve it with data quality management.
Learn 8 Min Read

What's GRC? Governance, Risk & Compliance Explained

GRC ensures organizations meet third-party requirements while still hitting high-performance goals. Learn what it is and how to implement it.
Learn 10 Min Read

Cyber Kill Chains: Strategies & Tactics

A cyber kill chain framework helps you understand and combat attacks. Learn about the evolution and applications of the cyber kill chain.
Learn 6 Min Read

What's a Firewall? The Complete Guide

Learn about firewalls, including how it works, and the popular types of firewalls. Also, check out some of the best practices for choosing firewalls.
Learn 7 Min Read

What Are Social Engineering Attacks? A Detailed Explanation

In this post, we'll explore how cybercriminals use a variety of tactics and understand how to defend against social engineering attacks.