Skip to main content
false

Chrissy Kidd

Chrissy Kidd is a technology writer, editor, and speaker based in Baltimore. The managing editor for Splunk Learn, Chrissy has covered a variety of tech topics, including ITSM & ITOps, software development, sustainable technology, and cybersecurity. Previous work includes BMC Software, Johns Hopkins Bloomberg School of Public Health, and several start-ups. She's particularly interested in how tech intersects with our daily lives. 

Learn 5 Min Read

Network Traffic & Network Congestion: The Complete Guide

Network traffic is critical for businesses today. Read on to learn how network traffic works, and how to stop traffic congestion.
Learn 2 Min Read

Splunk Podcasts

Wondering if Splunk has any podcasts? The answer is YES! In this article, you can see all the podcasts that Splunk has published over the years.
Learn 10 Min Read

What is Threat Modeling?

Get started with threat modeling today. We’ll define threat modeling, discuss how it works, and share simple and advanced threat modeling frameworks.
Learn 5 Min Read

Cybersecurity Trends: 8 Critical Trends to Watch

Calling all CISOs, security pros & anyone into security: Be prepared (and know how to prepare) for the biggest cyber threats and trends today.
Learn 4 Min Read

Ransomware & Extortionware in 2025: Stats & Trends

Ransomware is among the worst threats you face. Even worse? Ransomware keeps changing how it attacks. Get the latest ransomware trends & stats here.
Learn 6 Min Read

Tech Newsletters To Read in 2025

Not sure which tech newsletters you're missing? Get started with these must-reads, covering every angle of tech.
Learn 7 Min Read

SOAR: Security Orchestration, Automation & Response

SOAR revolutionizes how security operations teams manage, analyze and respond to alerts and threats. Learn what a modern SOAR solution is — and isn't.
Learn 8 Min Read

Data Lake vs. Data Warehouse: What's The Difference?

Data, data everywhere! 🤓 But where do you store it? Depends on the need! Data lakes are fun but have no boundaries, and data warehouses are ready for business.
Learn 4 Min Read

SOCs: Security Operation Centers Explained

SOC is a centralized location where security professionals build and maintain the security architecture that monitors, detects, analyzes and responds to cybersecurity incidents and threats, typically around the clock.
Learn 10 Min Read

What is Distributed Tracing?

A super helpful way to improve customer experience is to know what's going on across all apps, services, and requests. That's what distributed tracing does.
Learn 7 Min Read

What is a Data Platform?

Data platforms are the key to truly becoming a data-driven organization. Learn what you're missing without a modern data platform.
Learn 7 Min Read

Zero Trust & Zero Trust Network Architecture (ZTNA)

Trust no one, authenticate everyone. That's what zero trust is all about. Get the full cyber story in this in-depth article.
Learn 7 Min Read

What is Extended Detection and Response (XDR)?

XDR for cybersecurity: secure those endpoints! Get the full story on what XDR can — and cannot — do in strengthening your security posture.
Learn 8 Min Read

Sustainable Technology in 2025

Sustainable technology doesn’t get enough attention. Find out what sustainable IT means and how companies and individuals can use tech more sustainably.
Learn 10 Min Read

SIEM: Security Information & Event Management Explained

SIEM is a cybersecurity game-changer, especially for large organizations. Learn key SIEM features and functions & how to choose the right SIEM tool.
Learn 8 Min Read

Distributed Systems Explained

Distributed systems power most everything digital. Learn how they work, what they do, and why organizations rely on them so much.
Learn 5 Min Read

Log Analytics: Analyzing Log Data 101

Breaking news: Log data can provide a ton of value, if you know how to do it right. Read on to get everything you need to know to maximize value from logs.
Learn 2 Min Read

Splunk Open Source: What To Know

Get the latest on open-source products and solutions from Splunk, plus a ton of excellent, free (!!), hands-on resources for exploring with Splunk.
Learn 4 Min Read

What is Federated Search?

Searching isn’t as easy as you think: did Google get your request? Are you pinging multiple databases? Is ChatGPT involved? Learn all about federated search here.
Learn 11 Min Read

Monitoring vs Observability vs Telemetry: What's The Difference?

Don’t be confused, be creative. Observability is a lot more than mere monitoring. In fact, the possibilities are practically endless. Find out more here.
Learn 4 Min Read

Ransomware Families & RaaS Groups

Every 19 seconds a ransomware attack launches. Are these standalone attacks? Are they operating within a ransomware family of shared knowledge? Find out here.