Skip to main content
false
Leadership
6 min read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

.conf24

.conf & .conf Go
3 min read
Splunk has teamed up with Cisco to deliver engineers and ITOps teams with an improved leading observability experience.

Accelerate Digital Resilience with Splunk AI Assistant for SPL

Splunk is proud to launch and make generally available globally, our generative AI powered Splunk AI Assistant for SPL.
.conf & .conf Go 4 Min Read

Fast Track to Digital Resilience: Splunk Platform Innovation

Announcing Splunk Enterprise 9.3 and the latest Splunk Cloud Platform release, giving you all the tools you need to drive digital resilience.
.conf & .conf Go 3 Min Read

New Splunk Innovations Help Build a Leading Observability Practice for the Whole Enterprise

The latest and greatest from Splunk Observability to help keep your entire stack up and running, no matter where it’s deployed or who’s troubleshooting.
.conf & .conf Go 4 Min Read

Introducing the SIEM of the Future: Splunk® Enterprise Security 8.0

Introducing the SIEM of the future, Splunk® Enterprise Security 8.0 – available now in a private preview to revolutionize the SOC workflow experience.

Learn

Latest Articles

Learn 6 Min Read

Structured, Unstructured & Semi-Structured Data

An effective data management strategy is focused on the security, and transparency of structured, unstructured, and semi-structured data.
Learn 6 Min Read

Vulnerabilities, Threats & Risk Explained

Vulnerability, threat, risk: These terms are frequently used together, but they do explain three separate components of cybersecurity?
Tips & Tricks 4 Min Read

Convert Scheduled Dashboards to Dashboard Studio in Splunk Enterprise 9.3

Quickly and easily convert your scheduled Classic dashboards to Dashboard Studio for a superior export experience.
Security 6 Min Read

AcidPour Wiper Malware: Threat Analysis and Detections

The Splunk Threat Research Team provides an analysis of AcidPour and how to use Splunk’s out-of-the-box security content to help defend against this wiper malware.
Learn 6 Min Read

Audit Logging: A Comprehensive Guide

In this article, we’ll answer our simple question: How can you use audit logging, and what use cases do audit logs best support?
Security 3 Min Read

How Splunk SOAR is Helping Organizations Achieve a More Resilient Approach to Security

We worked with Peerspot to capture some of the ways customers have found success while using Splunk SOAR as part of their security stack.
Learn 8 Min Read

What Is OpenTracing?

Though the OpenTracing project is no longer supported, learn how it worked & how to migrate to the newer OpenTelemetry framework.
Learn 4 Min Read

AI Bill of Rights: What Does It Mean?

In this blog post, we will delve into what the AI Bill of Rights is, its key principles, and the future of AI regulation in the United States.
Learn 5 Min Read

The CISO Role: What Does a Chief Information Security Officer Do?

Understand the vital role of CISO, including responsibilities, skills and experience, reporting & hierarchy, salary ranges, and more.