Skip to main content
false
Faya Peng
Faya Peng

Faya leads the PM teams responsible for the Data Platform in Splunk Cloud Platform and Splunk Enterprise (includes Search, Indexing, Data Management, and Experiences). Her previous roles at Splunk include leading the Product Marketing team and Business Operations and Strategy for IT Markets/Observability. Faya holds a BS in Electrical Engineering from the University of Texas at Austin and an MBA from Harvard Business School.

Learn 4 Min Read

Endpoints and Endpoint Detection: Importance & Risk Mapping

Endpoints sound like an afterthought...not like the most important part of your cybersecurity posture. Learn what endpoints are, and why detecting them is so important.
Learn 6 Min Read

Endpoint Security Explained

Discover the role of endpoint security in protecting network integrity. This guide shares insights into implementing robust security measures for effective cyber defense.
Learn 5 Min Read

AI Bill of Rights: What Does It Mean?

In this blog post, we will delve into what the AI Bill of Rights is, its key principles, and the future of AI regulation in the United States.
Learn 4 Min Read

What is a Computer Server?

Computer servers do indeed serve: they serve up compute power and data! Get the full server story in this in-depth article.
Learn 7 Min Read

Continuous Threat Exposure Management (CTEM)

Attack surfaces changing daily? Cyber threats on the rise? Old ways of working ain't cutting it? CTEM may be your cyber solution. Get the full story here.
Learn 6 Min Read

The SaaS Security Guide: Best Practices for Securing SaaS

In this article, let’s look at SaaS security: what it is, the most common threats to SaaS and actionable best practices for securing SaaS applications.
Security 17 Min Read

Hunting M365 Invaders: Blue Team's Guide to Initial Access Vectors

Discover insights from the Splunk Threat Research Team on Microsoft 365 threat detection, focusing on data source analysis and effective methods for hunting initial access threats.
Learn 6 Min Read

Shadow IT & How To Manage It Today

Shadow IT exists for a few reasons: is one side more right? Is there a middle ground? Get the full story from IT expert Joseph Nduhiu in this article.
DevOps 5 Min Read

The Importance of Traces for Modern APM [Part 2]

In the second part of this blog we will explore how increased entropy forces us to rethink what is required for monitoring.