One approach to a cybersecurity strategy, cyber hygiene is the way of creating a structured, intelligent environment that reduces the risk of contamination.
Every month, our Splunk staff of security experts share their favorite reads of the month — this way, you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Large language models have changed the world. What about small language models? Learn what SLMs are, how they differ from LLMs, and why SLMs are the future.
Telemetry is powerful data that can tell you all sorts of important information. Know what you can do with this useful data — get the full telemetry 101 here.
Making thresholds adaptive supports your overall monitoring strategy. Read on for four tips for configuring adaptive thresholding for high-value use cases.
On the heels of an exciting GA in March and the April announcement of its regional expansion, we are excited to share the latest updates to Splunk Edge Processor that will make it even easier for customers to have more flexibility and control over just the data you want, nothing more nothing less.
Protect your enterprise from evolving cyber threats with the 3Rs of security: Rotate, Repave, and Repair. Stay ahead of attackers and secure your organization.
Welcome to the July 2023 edition of our Splunk staff picks blog, featuring a list of presentations, whitepapers, and customer case studies that we feel are worth a read.