false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Learn 5 Min Read

IT/ITIL Problem Management

Discover ITIL Problem Management: Learn how to reduce incidents, improve service, and boost IT maturity with proactive problem-solving strategies.
Learn 5 Min Read

Top 6 Data Analysis Techniques Used by Pro Data Analysts

Data analysis is important, but how do you get started? These top techniques, used by professional data analysts, will help you get the most value out of your data.
Learn 12 Min Read

SIEM: Security Information & Event Management Explained

SIEM is a cybersecurity game-changer, especially for large organizations. Learn key SIEM features and functions & how to choose the right SIEM tool.

Scaling Anomaly Detection with MLTK 5.5

Who doesn’t love a bit of anomaly detection with Splunk? As someone who has spent far too long talking about cyclical statistical forecasts and anomalies, you’ll be relieved that this is a topic that we don’t get tired of here at Splunk! In this blog post we will be taking you through some of the recent changes to the Machine Learning Toolkit, where we have released a more scalable version of our users most favorite algorithm.
Learn 7 Min Read

Website Security: Tips & Best Practices for Securing Websites

Protect your website with essential security tips and best practices. Learn how to defend against cyber threats, safeguard data, and build customer trust.
Observability 4 Min Read

Splunk AppDynamics 24.10 Accelerates Deployment And MTTR

Splunk AppDynamics, now part of the Splunk Observability portfolio, provides critical observability for traditional 3-tier/n-tier applications and helps IT Operations teams quickly discover root causes of issues before end-users even notice.
Security 18 Min Read

Meduza Stealer Analysis: A Closer Look at its Techniques and Attack Vector

Uncover Meduza Stealer, a 2023 malware targeting credentials and crypto wallets. Explore its evasion tactics, attack methods, and Splunk’s expert insights for enhanced security.
Learn 11 Min Read

SLA Templates: How To Create Service Level Agreements

SLAs power the digital world: they define what users can expect from a service and what happens when a service provider fails to meet those expectations.
Learn 4 Min Read

What’s SaaS Monitoring? Why You Need To Monitor SaaS Apps

The SaaS delivery model comes with many conveniences for organizations. But you have less visibility to answer questions, and that’s where SaaS monitoring comes in.