Skip to main content
false
Leadership
6 Min Read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

Security

Learn

Latest Articles

Learn 10 Min Read

Red Teams vs. Blue Teams: What’s The Difference?

Effective cybersecurity is a group effort - better yet, a multi-group effort. Learn how the Red Team Blue Team approach tackles security from both angles.
Security 10 Min Read

Trust Unearned? Evaluating CA Trustworthiness Across 5 Billion Certificates

In this blog post, we dive into our recent research project, in which the Splunk SURGe team analyzed more than five billion TLS certificates to find out if the CAs we rely on are really worthy of our trust.
Security 9 Min Read

Model-Assisted Threat Hunting (M-ATH) with the PEAK Framework

Welcome to the third entry in our introduction to the PEAK Threat Hunting Framework! Taking our detective theme to the next level, imagine a tough case where you need to call in a specialized investigator. For these unique cases, we can use algorithmically-driven approaches called Model-Assisted Threat Hunting (M-ATH).
Industries 3 Min Read

Fighting Fraud, Waste, and Abuse in Government

Leveraging Splunk's ability to correlate events helps investigators detect patterns and anomalies across multiple data sets that are difficult to see using spreadsheets or traditional Business Intelligence tools
Learn 6 Min Read

Cloud Cryptomining: How It Works & How To Minimize Risk

Are the days of setting up expensive cryptomining rigs over? Learn how cloud cryptomining brings cost reduction, scalability and efficiency to cryptocurrency mining.
Learn 6 Min Read

What Is DPE? Developer Productivity Engineering Explained

With rising expectations for development turnaround, DPE processes are key in maintaining quality, speed and a satisfying developer experience.
Partners 4 Min Read

Help Safeguard Your SAP Environment with Splunk® Security for SAP® Solutions

Announcing Splunk Security for SAP solutions, an SAP Endorsed Application that allows security teams to leverage Splunk to monitor, identify and address threats impacting SAP environments.
Observability 2 Min Read

The State of Observability 2023: Realizing ROI and Increasing Digital Resilience

Splunk has published The State of Observability 2023 — a research report created in partnership with ESG — to understand best practices, challenges and trends across the observability landscape.
Learn 6 Min Read

RSA Algorithm in Cryptography: Rivest Shamir Adleman Explained

RSA encryption allows us to transmit sensitive data online. Here we discuss how RSA works, its use cases, and what security vulnerabilities it presents.