/en_us/blog/ciso-circle/ciso-ai-strategy-digital-resilience

Splunk Blogs

Artificial Intelligence

Learn

Latest Articles

Protecting the Public Purse: How Trust and Technology Can Prevent Government Payment Fraud
Industries
6 Minute Read

Protecting the Public Purse: How Trust and Technology Can Prevent Government Payment Fraud

Government payment fraud is a systemic vulnerability within modern digital service delivery – and it requires urgent reform.
From Weeks to Minutes: Accelerating Data Intelligence with AI-Powered Data Management
Artificial Intelligence
6 Minute Read

From Weeks to Minutes: Accelerating Data Intelligence with AI-Powered Data Management

Splunk Data Management allows for the transformation of raw telemetry into real-time insights, effectively supporting critical use cases across domains such as SecOps, ITOps, Network Assurance, and Observability.
Unleashing Resilience: Why the Agentic Era Demands a Unified Data Fabric
Platform
7 Minute Read

Unleashing Resilience: Why the Agentic Era Demands a Unified Data Fabric

Resilience in this era means connecting machine data with business and knowledge streams, and activating it as the foundation for intelligent, agentic operations.
The Art of the Possible: Saving Tigers and Elephants with AI
Global Impact
8 Minute Read

The Art of the Possible: Saving Tigers and Elephants with AI

Discover how WWF and Splunk use AI to combat poaching. Learn how a Wildlife Protection Operations Center (WOC) uses data and machine learning to save endangered species.
How Provenance Enables Responsible Open-Source AI Governance
Cio Office
5 Minute Read

How Provenance Enables Responsible Open-Source AI Governance

Explore the critical role of model lineage and provenance in securing open-source AI. Improve your organization's AI governance and risk management today.
AI Security Platforms: Managing Security at Modern Scale
Learn
4 Minute Read

AI Security Platforms: Managing Security at Modern Scale

Nothing described with “zero” sounds good. That’s absolutely the case here, when it comes to zero-day vulnerabilities, exploits and attacks.
Splunk Security Content for Threat Detection & Response: February Recap
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: February Recap

In February, the Splunk Threat Research Team (STRT) had 2 releases of new security content via the Enterprise Security Content Update (ESCU) app (v5.21 and v5.22).
Risk Register Explained: Key Components, Benefits, and Managing Business Risks
Learn
4 Minute Read

Risk Register Explained: Key Components, Benefits, and Managing Business Risks

Learn what a risk register is, its key components, benefits, and how it helps organizations manage and respond to business risks and opportunities.
How to Ensure AI Remains Your Ally, Not Your Adversary
Cio Office
8 Minute Read

How to Ensure AI Remains Your Ally, Not Your Adversary

Discover actionable strategies for embedding security into every phase of AI. Understand how CSA’s frameworks, governance, and privacy controls protect your organization and build trust.