The latest and greatest from Splunk Observability to help keep your entire stack up and running, no matter where it’s deployed or who’s troubleshooting.
Announcing the latest feature enhancements in Splunk IT Service Intelligence (ITSI) 4.19, designed to operationalize the way organizations manage their IT services.
Vulnerability, threat and risk are three fundamental concepts in cybersecurity. Learn from industry experts how they differ and play out in IT environments.
A cyber kill chain framework can help organizations to better understand and combat attacks. Learn about the evolution and applications of the cyber kill chain.
Threat hunting is a proactive approach that harnesses human intuition and creativity to identify and counter security incidents that may otherwise go undetected.
Incident severity levels indicate how an incident impacts your customers, so you can prioritize and respond appropriately. Learn how to define and use them.
DoS attacks have a long history, but they’re also predicted to get worse in 2023. Find out the many ways they work and learn to prevent them in the first place.
The CO2 footprint of data centers globally is equivalent to the world’s entire airline industry combined. Moving on-premise data centers to the cloud could reduce the CO2 footprint by at least 80%. Learn more about how Splunk and Accenture are partnering to help you harvest the low hanging fruit on your sustainability journey.
In celebration of the 10th Annual CX Day, Splunk's Katie Bianchi reflects on how we've established CX as a priority for every leader and organization, with intentional, specific goals for accountability.
See how the Splunk Tales video series helps address how-to's, Splunk definitions, Splunk roles or questions that our support representatives frequently receive from customers.
Splunk's new Vice President, Worldwide Channels and Alliances, Gretchen O'Hara, shares a closer look at her journey to Splunk and why she's excited to join the team.
Ever wondered where to get started with machine learning at Splunk? This blog contains links to deep dives that provide end-to-end guides for how to implement specific use cases against your own data.
Check out the latest staff picks from Splunk security experts, featuring presentations, whitepapers, and customer case studies that we feel are worth a read.
The Splunk Threat Research Team shares a closer look at a hunting analytic and two machine learning-based detections that help find users running highly suspicious risky SPL commands.
Synthetic monitoring lets you simulate user transactions, so you can find out about problems before your customer's angry social media post goes viral.