The latest and greatest from Splunk Observability to help keep your entire stack up and running, no matter where it’s deployed or who’s troubleshooting.
Announcing the latest feature enhancements in Splunk IT Service Intelligence (ITSI) 4.19, designed to operationalize the way organizations manage their IT services.
Vulnerability, threat and risk are three fundamental concepts in cybersecurity. Learn from industry experts how they differ and play out in IT environments.
A cyber kill chain framework can help organizations to better understand and combat attacks. Learn about the evolution and applications of the cyber kill chain.
Threat hunting is a proactive approach that harnesses human intuition and creativity to identify and counter security incidents that may otherwise go undetected.
Incident severity levels indicate how an incident impacts your customers, so you can prioritize and respond appropriately. Learn how to define and use them.
DoS attacks have a long history, but they’re also predicted to get worse in 2023. Find out the many ways they work and learn to prevent them in the first place.
Is hacking evil? We’ll explain how hacking is a spectrum, with some good, some bad, some ugly. But it has potential to affect 2/3 of the Earth’s population!
Splunk Log Observer is no longer available for purchase. Luckily, we’ve got you covered for all the same Observability functions. Get the details here.
The Splunk Success Framework contains best practices to help you decrease time to value, drive adoption, and enable Splunk environments to scale as you grow.
Access control: Role based or attribute based? Get the full story on RBAC and ABAC — and yes, even our old friend ACL — in this access control article.
Don’t be held hostage by cyberattackers. Ransomware is here to stay. Prepare by knowing exactly how they work (there’s different types) and how to prevent them
Disaster recovery planning. No one’s favorite activity, but someone’s gotta do it. Plan easily with this step-by-step framework that covers all disaster types.
DoS attacks have a long history, but they’re also predicted to get worse in 2023. Find out the many ways they work and learn to prevent them in the first place.
Humans have encrypted messages for millennia. Today it’s essentially part of daily life. Understand how it works — and decide if you need end-to-end encryption.