false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Security 5 Min Read

Defending at Machine-Speed: Accelerated Threat Hunting with Open Weight LLM Models

Splunker Ryan Fetterman explains how Splunk DSDL 5.2 enhances cybersecurity operations, streamlining PowerShell script classification and reducing analyst workload by 250x.

Faster Insights with Splunk AI Assistant for SPL: Now More Personal Than Ever

Splunkers Mohit Verma and Jeff Wiedemann break down the latest advancements in Splunk AI Assistant for SPL v1.1, featuring personalized SPL queries, enhanced AI capabilities, and categorized prompt suggestions.
Learn 8 Min Read

What Cybersecurity Means in 2025: A Complete Overview of Cybersecurity

Learn about cybersecurity and its importance. Take a look at various kinds of cyber threats, risks, and tools and frameworks to mitigate them.
Security 3 Min Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Every month, our Splunk staff of security experts share their favorite reads of the month — this way, you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Learn 5 Min Read

How To Create Successful SOPs: Standard Operating Procedures

Need to write SOPs? Check out this complete guide to creating successful standard operating procedures, including how to write one and manage it over time.
Learn 4 Min Read

What are Diffusion Models?

Learn about diffusion models, a groundbreaking AI development that generates high-quality images, videos, and text. Explore their applications, how they work, and future potential.
Learn 11 Min Read

What Is a SOC? Security Operations Centers: A Complete Overview

In this article, we'll discuss security operations center (SOC), which acts as the central hub for all cybersecurity activities in an organization.
Security 16 Min Read

Sinister SQL Queries and How to Catch Them

Discover comprehensive strategies for detecting and mitigating SQL Server attacks.
Learn 5 Min Read

RSAC™ 2025 Conference: The Complete Guide

This blog post is the complete guide to the 2025 RSA conference.