Skip to main content
false
Leadership
6 min read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

.conf24

.conf & .conf Go
1 min read
Congratulations to all of the 2024 Splunkie Award winners announced at .conf24!
.conf & .conf Go 2 Min Read

Data Integration for Higher Education: An NJIT and Splunk Case Study

With Splunk, NJIT can combine disparate streams of event, academic and infrastructure data to bolster physical and digital security across the campus.
.conf & .conf Go 2 Min Read

Announcing the 2024 Splunk Partner Awards Winners!

Congratulations to the 2024 Splunk Partner Awards winners and our entire partner community on an outstanding year!
.conf & .conf Go 3 Min Read

Supercharge Insights with Generative AI: Splunk AI Assistant for SPL is now GA

Announced at .conf24, Splunk AI Assistant for SPL is now available globally for Splunk Cloud users.
.conf & .conf Go 3 Min Read

Cisco and Splunk Bring Full-Stack Observability to the Entire Enterprise

Splunk has teamed up with Cisco to deliver engineers and ITOps teams with an improved leading observability experience.

Learn

Latest Articles

DevOps 3 Min Read

Getting Started with Observability: What is OpenTelemetry?

How do you collect and send your data to an Observability tool? Learn more about what OpenTelemetry is and how it makes this question easier to answer.
Learn 4 Min Read

How Intrusion Detection Systems (IDS) Work: One Part of Your Security Arsenal

Are Intrusion Detection Systems outdated? Are they enough? See how IDS detect unauthorized network intrusions, and understand their limitations, too.
Learn 4 Min Read

Cybercrime as a Service (CaaS) Explained

Perhaps unsurprisingly, cybercrime is now available for hire. Harnessing the ‘as a service’ model, find out how cybercrime can be enacted by practically anyone.
Leadership 7 Min Read

Predictions: AI and Automation

In this blog we predict what's to come for AI and Automation trends in 2023 and beyond!
Learn 6 Min Read

Cryptography 101: Key Principles, Major Types, Use Cases & Algorithms

Cryptography underpins so many digital interactions — you might not even realize it. Get the full story on cryptography, use cases and emerging types.
Learn 4 Min Read

Social Engineering Attacks: The 4 Stage Lifecycle & Common Techniques

Social engineering attacks are everywhere. That’s because they exploit the weakest security link: humans. Read on to know the lifecycle and common techniques.
Learn 6 Min Read

Cybersecurity Risk Management: 5 Steps for Assessing Risk

Don’t just guess your risk profile — assess it! Learn about cybersecurity risk management and apply these 5 steps to turn the process into an ongoing practice.
Learn 3 Min Read

How Structured, Unstructured & Semi-Structured Data Change Your Data Analytics Practice

Know the three structure types of data: structured, unstructured & semi-structured, and see exactly what this means for your data analytics practice.
Platform 1 Min Read

Securely Access your Information in Splunk AR: Splunk FileLink

We’re excited to share that Splunk FileLink is now available to all Splunk AR customers! This makes securely accessing your information in Splunk AR easier allowing you to reduce MTTR.