Skip to main content
false
Swatts

Stephen Watts

Stephen Watts works in growth marketing at Splunk. Stephen holds a degree in Philosophy from Auburn University and is an MSIS candidate at UC Denver. He contributes to a variety of publications including CIO.com, Search Engine Journal, ITSM.Tools, IT Chronicles, DZone, and CompTIA.

Learn 11 Min Read

What Is Natural Language Processing? NLP Explained

In this post, we'll take a deep dive into Natural Language Processing (NLP) including its history, definition, and use cases.
Learn 11 Min Read

What is AIOps? A Comprehensive AIOps Intro

In this post, we’ll see how AIOps work, its use cases and benefits, and how you can get started implementing AIOps in your organization.
Learn 12 Min Read

What Is Predictive Modeling? An Introduction

Predictive modeling uses known results to create a statistical model that we can use to forecast future behaviors. Read on to learn more.
Learn 14 Min Read

What Is Incident Response?

In this post, we'll cover what incident response is and why it's essential for organizations to protect themselves from digital threats.
Learn 14 Min Read

What Is Root Cause Analysis? The Complete RCA Guide

In this article, we'll explore how to conduct RCA, its core principles, best practices, and the tools available to facilitate this process.
Learn 15 Min Read

What Is Network Configuration?

In this post, we'll do a deep dive into network configuration and include best practices for keeping networks up and running
Learn 5 Min Read

What is Digital Experience Monitoring?

Analyze the performance of enterprise digital applications and services while ensuring a seamless customer experience through digital experience monitoring (DEM).
Learn 8 Min Read

What Is Anomaly Detection? Examples, Techniques & Solutions

Interest in anomaly detection is on the rise everywhere. Anomaly detection is really about understanding our data and what we expect from "normal" behavior. Learn more here.
Learn 12 Min Read

What Is Cybersecurity? The Ultimate Guide

Learn about cybersecurity and its importance. Take a look at various kinds of cyber threats, risks, and tools and frameworks to mitigate them.
Learn 5 Min Read

The CISO Role: What Does a Chief Information Security Officer Do?

Understand the vital role of CISO, including responsibilities, skills and experience, reporting & hierarchy, salary ranges, and more.
Learn 10 Min Read

The CVE & CVE Management, Explained

The CVE is a go-to public list of vulnerabilities and exposures that threat actors can harness. Get the full story for managing CVEs here.
Learn 5 Min Read

Splunk Product Reviews & Ratings - Enterprise, Cloud & ES

Splunk delivers AI-powered solutions for digital resilience. Explore Splunk Enterprise, Splunk Cloud, and Splunk Enterprise Security for advanced analytics and cybersecurity.
Learn 4 Min Read

Splunk Tutorial: Getting Started Using Splunk

Whether you are new to Splunk or just needing a refresh, this post can guide you to some of the best resources on the web for using Splunk.
Learn 5 Min Read

RSA Conference 2025: Complete Guide

This blog post is the complete guide to the 2024 RSA conference.
Learn 4 Min Read

Google Cloud Next 2025: Complete Guide

This blog post will cover the complete details around Google Cloud Next 2024, the upcoming conference in Las Vegas.
Learn 6 Min Read

Google Dorking: An Introduction for Cybersecurity Professionals

In this blog post, we'll take a look at the basics of Google Dorking (AKA Google Hacking), how it can impact your organization, and steps you can take to mitigate this risk.
Learn 2 Min Read

RED Monitoring: Rate, Errors, and Duration

In this blog post, we'll take a brief look at the RED monitoring framework, its benefits, and how it is used in the modern digital enterprise.
Learn 4 Min Read

Machine Customers: A Brief Introduction

In this blog post, we'll take a look at the future of machine customers and they impact they could hold.
Learn 7 Min Read

Metrics to Monitor for AWS (ELB) Elastic Load Balancing

In this blog post, we'll take a look at metrics to monitor for AWS Elastic Load Balancing.
Learn 5 Min Read

What is Cardinality? Cardinality Metrics for Monitoring and Observability

In this blog post we’ll define cardinality and high cardinality, and explore the role of cardinality in monitoring and observability.
Learn 16 Min Read

Splunk Cheat Sheet: Query, SPL, RegEx, & Commands

In this blog post we'll cover the basics Queries, Commands, RegEx, SPL, and more for using Splunk Cloud and Splunk Enterprise
Learn 3 Min Read

Dogfooding: AKA drinking your own champagne, or eating your own ice cream

In this blog post we'll take a quick look at the history, benefits, challenges, and language of dogfooding.
Learn 16 Min Read

IT Spending & Budgets: Trends & Forecasts 2025

In this blog post we'll look at IT spending trends & forecasts from top analysts and prognosticators for 2024.
Learn 4 Min Read

Democratized Generative AI: Revolutionizing Knowledge Work

In this blog post, we'll take a look at the increasingly popular topic of Democratized Generative AI and how its transforming the way people work.