One approach to a cybersecurity strategy, cyber hygiene is the way of creating a structured, intelligent environment that reduces the risk of contamination.
Every month, our Splunk staff of security experts share their favorite reads of the month — this way, you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Large language models have changed the world. What about small language models? Learn what SLMs are, how they differ from LLMs, and why SLMs are the future.
Telemetry is powerful data that can tell you all sorts of important information. Know what you can do with this useful data — get the full telemetry 101 here.
Explore applied model-assisted threat hunting for dictionary-based domain generation algorithms using the SURGe Security Research Team's PEAK Threat Hunting Framework.
Data security is more important than ever. With organizations relying heavily on technology for their sensitive information, the risk of data breaches is constantly rising.
We introduced a large language model (LLM)-based phishing email detector integrated into the Splunk DSDL app. We provide details on model training and evaluation, comparisons to other machine learning and deep learning algorithms as well as deployment approaches to Splunk in this blog.
Discover the key differences between SLAs, SLOs, and SLIs in service-driven businesses. Learn best practices and overcome challenges in implementing these crucial metrics.
No matter your industry, starting point, or organizational size, the Use Case Explorers for Security and Observability will help you improve digital resilience.