Skip to main content
false
David Dalling
David Dalling

David is a subject matter expert with over 20 years of Information Security experience and IT Operations. He is an accomplished, motivated, and versatile IT professional in a variety of Information Technology fields ranging from hands-on systems development, testing, and management to enterprise-level strategic planning, and consultation. David is a man of firsts; He helped get the DHS Enterprise Security Operations program its first ever ATO, wrote the first ever common control package for DHS, received a security engineering award at DHS HQ for developing a metrics program that contributed to DHS first ever perfect score card. Taking this experience David then lead the development of the first ever Managed XDR service to receive its FedRAMP Authorization. David has now taken his love to take on new challenges to Adventure racing were he purposely gets lost in the woods to compete with Trail running, Mountain biking and kayaking for 100s miles. As the Global VP for Splunk’s Cyber Strategist team, David helps drive the security strategy for Splunk and its security products.

Security 4 Min Read

Splunk Security Content for Impact Assessment of CrowdStrike Windows Outage

This blog is intended to help existing Splunk customers who are also customers of CrowdStrike gain visibility into how the CrowdStrike outage may be impacting their organizations.
Learn 7 Min Read

Chaos Testing Explained

A part of SRE, chaos testing is a software testing approach where we intentionally break things in an app in order to test and strengthen its resilience.
Learn 2 Min Read

Continual Learning in AI: How It Works & Why AI Needs It

Learning is easy for humans, and a lot more difficult for artificial intelligence. Learn all about the concept of continual learning here.
Security 3 Min Read

Splunk at Black Hat 2024: Strategic Transformations to Power the SOC of the Future

At Black Hat 2024, Splunk will demonstrate how we’re empowering security teams to embrace strategic transformations and navigate the complex threat landscape.
Learn 5 Min Read

What Is Cyber Forensics?

Cyber forensics is getting information, analyzing it, and gaining intelligence about criminal activities involving technology. Learn how it's done here.
Platform 3 Min Read

Announcing the Splunk SPL to SPL2 Converter

Introducing Splunk’s SPL to SPL2 converter, now available for Splunk Data Management‘s Edge Processor and Ingest Processor.
Platform 2 Min Read

Introducing Ingest Processor: An Evolution in Splunk Data Management

Splunk is pleased to announce the general availability of Ingest Processor, a Splunk-hosted offering within Splunk Cloud Platform designed to help customers achieve greater efficiencies in data transformation and improved visibility into data in motion.
Tips & Tricks 7 Min Read

Visualising Network Patterns with Splunk and Graphistry

One of the best ways to understand what is happening in the environment for security, observability or any other use case is to visualise the data. Network data is vital since it tells us how systems are connected and understanding it uplifts resiliency across the organisation. In this blog post, we use the Splunk App for Data Science and Deep Learning (DSDL) and Graphistry to visualise network data to represent the current state of the environment. Deep understanding of the network can help us identify and stop security threats earlier and improve application performance.
Learn 5 Min Read

What’s EDR? Endpoint Detection & Response

Learn how Endpoint Detection and Response secures endpoints and detects hidden threats to help organizations achieve better cybersecurity.