Skip to main content
false
Faya Peng
Faya Peng

Faya leads the PM teams responsible for the Data Platform in Splunk Cloud Platform and Splunk Enterprise (includes Search, Indexing, Data Management, and Experiences). Her previous roles at Splunk include leading the Product Marketing team and Business Operations and Strategy for IT Markets/Observability. Faya holds a BS in Electrical Engineering from the University of Texas at Austin and an MBA from Harvard Business School.

Learn 3 Min Read

Watering Hole Attacks, Explained

What happens when a vulnerability in vendor software (not your own) leads to a cyberattack? That’s a watering hole attack, and it’s what we’re exploring here.
Learn 3 Min Read

Splunk OnDemand Services: An Introduction & Example

Get started with Splunk OnDemand Services (ODS), an advisory service that bridges the gap between Technical Support and project-based services delivered by Professional Services.
Security 3 Min Read

Staff Picks for Splunk Security Reading February 2023

Explore the latest list of presentations, whitepapers, and customer case studies that our Splunk security experts feel are worth a read.
Learn 3 Min Read

Honeypots Explained: Hitting Hackers Where It Hurts

Entice hackers to your system to gather cyberthreat intelligence. Get the latest on honeypot types and interactions and see why it isn’t all so sweet.
Learn 5 Min Read

Phishing Scams & Attacks: A Complete Guide

With 323,000+ victims worldwide, phishing is the most common cybersecurity threat in the digital sphere. Get the latest trends and stats on avoiding phishing.
Learn 3 Min Read

Edge AI Explained: How It Works, Features, Challenges & More

Edge AI is destined to play a starring role in overall AI adoption — but it will face the same adoption challenges as any other AI or technology.
Learn 3 Min Read

Advanced Encryption Standard & AES Rijndael Explained

Learn all about AES Rijndael, today's go-to algorithm that won a NIST competition for ensuring data confidentiality — and it does much more than that!
Learn 3 Min Read

What's a Firewall? The Complete Guide

Firewalls are a standard cybersecurity technology, but implementing them is challenging. Read all about the 7 types of firewalls systems here.
Learn 1 Min Read

Network Security Monitoring (NSM) Explained

Network security monitoring sounds like other security measures like intrusion detection. Find out why it's not — and what makes it so useful for IT today.