Skip to main content
false
Leadership
6 min read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

.conf24

.conf & .conf Go
1 min read
Congratulations to all of the 2024 Splunkie Award winners announced at .conf24!
.conf & .conf Go 2 Min Read

Data Integration for Higher Education: An NJIT and Splunk Case Study

With Splunk, NJIT can combine disparate streams of event, academic and infrastructure data to bolster physical and digital security across the campus.
.conf & .conf Go 2 Min Read

Announcing the 2024 Splunk Partner Awards Winners!

Congratulations to the 2024 Splunk Partner Awards winners and our entire partner community on an outstanding year!
.conf & .conf Go 3 Min Read

Supercharge Insights with Generative AI: Splunk AI Assistant for SPL is now GA

Announced at .conf24, Splunk AI Assistant for SPL is now available globally for Splunk Cloud users.
.conf & .conf Go 3 Min Read

Cisco and Splunk Bring Full-Stack Observability to the Entire Enterprise

Splunk has teamed up with Cisco to deliver engineers and ITOps teams with an improved leading observability experience.

Learn

Latest Articles

Learn 3 Min Read

Watering Hole Attacks, Explained

What happens when a vulnerability in vendor software (not your own) leads to a cyberattack? That’s a watering hole attack, and it’s what we’re exploring here.
Learn 3 Min Read

Splunk OnDemand Services: An Introduction & Example

Get started with Splunk OnDemand Services (ODS), an advisory service that bridges the gap between Technical Support and project-based services delivered by Professional Services.
Security 3 Min Read

Staff Picks for Splunk Security Reading February 2023

Explore the latest list of presentations, whitepapers, and customer case studies that our Splunk security experts feel are worth a read.
Learn 3 Min Read

Honeypots Explained: Hitting Hackers Where It Hurts

Entice hackers to your system to gather cyberthreat intelligence. Get the latest on honeypot types and interactions and see why it isn’t all so sweet.
Learn 5 Min Read

Phishing Scams & Attacks: A Complete Guide

With 323,000+ victims worldwide, phishing is the most common cybersecurity threat in the digital sphere. Get the latest trends and stats on avoiding phishing.
Learn 3 Min Read

Edge AI Explained: How It Works, Features, Challenges & More

Edge AI is destined to play a starring role in overall AI adoption — but it will face the same adoption challenges as any other AI or technology.
Learn 3 Min Read

Advanced Encryption Standard & AES Rijndael Explained

Learn all about AES Rijndael, today's go-to algorithm that won a NIST competition for ensuring data confidentiality — and it does much more than that!
Learn 3 Min Read

What's a Firewall? The Complete Guide

Firewalls are a standard cybersecurity technology, but implementing them is challenging. Read all about the 7 types of firewalls systems here.
Learn 1 Min Read

Network Security Monitoring (NSM) Explained

Network security monitoring sounds like other security measures like intrusion detection. Find out why it's not — and what makes it so useful for IT today.