Skip to main content
false
Faya Peng
Faya Peng

Faya leads the PM teams responsible for the Data Platform in Splunk Cloud Platform and Splunk Enterprise (includes Search, Indexing, Data Management, and Experiences). Her previous roles at Splunk include leading the Product Marketing team and Business Operations and Strategy for IT Markets/Observability. Faya holds a BS in Electrical Engineering from the University of Texas at Austin and an MBA from Harvard Business School.

Learn 10 Min Read

What is Threat Modeling?

Get started with threat modeling today. We’ll define threat modeling, discuss how it works, and share simple and advanced threat modeling frameworks.
Security 4 Min Read

Add to Chrome? - Part 1: An Analysis of Chrome Browser Extension Security

An overview of SURGe research that analyzed the entire corpus of public browser extensions available on the Google Chrome Web Store.
Learn 4 Min Read

CVSS: The Common Vulnerability Scoring System

Common Vulnerability Scoring System (CVSS) is a framework designed to provide a consistent and objective way to assess the severity of security vulnerabilities in IT systems. Learn more in this blog post.

ManpowerGroup’s Unique Approach to Resilience with Splunk

CEO of The Futurum Group Daniel Newman sat down with Randy Herold, CISO & Chief Privacy Office of ManpowerGroup, to talk building digital resilience with Splunk.

AI Predictions Are Fueling Greater Cyber Up-Skilling Needs

Use our new Splunk Education e-book to guide the cybersecurity learning journey in this AI-dominated era.
Splunk Life 3 Min Read

A Coming-of-Age Brand Story

Splunk, meet your refresh – Splunker Adam Morgan shares his insights on the latest evolution of the Splunk brand.
Splunk Life 7 Min Read

Behind the Scenes with the Splunk Brand Refresh

Splunker Adam Morgan shares a behind-the-scenes look at Splunk's recent brand refresh.
Security 9 Min Read

Another Year of RATs and Trojan Stealer: Detection Commonalities and Summary

The Splunk Threat Research Team shares analysis, analytic stories and security detections for seven well-known RAT and Trojan Stealer malware families.
Security 4 Min Read

How Tech Executives Can Support Gender Diverse Cyber Talent

The number of unfilled cybersecurity roles creates a perfect opportunity for leaders to attract female talent at their organizations.