Skip to main content
false
Leadership
6 min read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

.conf24

.conf & .conf Go
1 min read
Congratulations to all of the 2024 Splunkie Award winners announced at .conf24!
.conf & .conf Go 2 Min Read

Data Integration for Higher Education: An NJIT and Splunk Case Study

With Splunk, NJIT can combine disparate streams of event, academic and infrastructure data to bolster physical and digital security across the campus.
.conf & .conf Go 2 Min Read

Announcing the 2024 Splunk Partner Awards Winners!

Congratulations to the 2024 Splunk Partner Awards winners and our entire partner community on an outstanding year!
.conf & .conf Go 3 Min Read

Supercharge Insights with Generative AI: Splunk AI Assistant for SPL is now GA

Announced at .conf24, Splunk AI Assistant for SPL is now available globally for Splunk Cloud users.
.conf & .conf Go 3 Min Read

Cisco and Splunk Bring Full-Stack Observability to the Entire Enterprise

Splunk has teamed up with Cisco to deliver engineers and ITOps teams with an improved leading observability experience.

Learn

Latest Articles

Industries 2 Min Read

Splunk Aims To Provide a Secure Cloud Solution to the Federal Government With an 'In Process' Status for FedRAMP® High Authorization

Splunk continues its commitment to the Federal Government by achieving an 'In Process' designation from the Federal Risk and Authorization Management Program (FedRAMP) Program Management Office (PMO) as it works towards FedRAMP High authorization.
Learn 4 Min Read

Ransomware Families & RaaS Groups

Every 19 seconds a ransomware attack launches. Are these standalone attacks? Are they operating within a ransomware family of shared knowledge? Find out here.
Learn 4 Min Read

Introduction To Key Management

A crucial part of cryptography and cybersecurity, key management is how you share secret key knowledge that enables secure communications over the network.
Learn 7 Min Read

Threat Hunting vs. Threat Detecting: What's The Difference?

Hunting threats, detecting threats. Sounds the same — but they are not! Get tons of info (+ free resources) for prevention methods that underpin cybersecurity.
Leadership 6 Min Read

Leadership differentiation opportunities in 2023

Irrespective of the prediction, trend or new amazing technology, its impact is only realised when successfully deployed by an organisation’s expert team(s). To help, I’ve captured just a few of my thoughts for how leaders can differentiate some broad demands to make the best impact in the year to come.
Learn 3 Min Read

The Triple DES Intro: Triple Data Encryption Standard

Triple DES is an encryption standard that’s NIST-approved for use through 2030. Let’s see how it works and when you want — and don’t want — to use it.
Leadership 3 Min Read

New Research on Digital Resilience Unveils Massive Opportunity for Organizations

Splunk's 'Digital Resilience Pays Off' report explores how organizations are investing in critical digital resilience capabilities and the business impact.
Learn 5 Min Read

Business Resilience: What It Is & How To Build It

Business resilience is an encompassing way to prepare your organization for anything. Research shows how resiliency enables you to thrive amid change!
Learn 4 Min Read

Elliptic Curve Cryptography: An Introduction

Let’s see how elliptic curve cryptography works, in this digestible, less academic look that still thoroughly explains this technical topic.