false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Learn 5 Min Read

Managed Detection & Response: MDR Explained

Learn how Managed Detection and Response (MDR) services enhance cybersecurity, address challenges, and provide 24/7 security.
Leadership 7 Min Read

Leveraging Splunk Dashboards for Executive Visibility

Splunk's real-time dashboards provide comprehensive visibility into all of an organization's systems, enabling them to identify and address key risks and issues before they become major incidents.
Learn 7 Min Read

Metadata 101: Definition, Types & Examples

Often referred to as "data about data," metadata simplifies data management and actually helps you do all sorts of cool stuff. Get the details here.
Learn 7 Min Read

API Security Testing: Importance, Methods, and Top Tools for Testing APIs

API security testing is crucial for identifying vulnerabilities and protecting sensitive data. Discover the top API security testing tools and their benefits.
Learn 6 Min Read

Data Scanning Explained: What Scanning Data Can Do For You

How do you know which data is the most sensitive? Data scanning is your starting point! Learn how to scan data & get all the details here.
Leadership 3 Min Read

Thousands of Customer-Driven Splunk Ideas Help Accelerate Meaningful Innovation

Our Tom Casey emphasizes the importance of customer feedback, idea implementation, and transparent communication for driving innovation here at Splunk.
Security 2 Min Read

Identifying BOD 23-02 Network Management Interfaces with Splunk

Splunker Drew Church explains the CISA-released directive to reduce risk from internet-exposed management interfaces, highlighting the threat of external remote services.
Security 4 Min Read

The Lessons Learned in Cybersecurity 25 Years Ago Are Still Applicable to AI Today

Splunk's Paul Kurtz explores what we can learn from past events as AI accelerates the future.
Learn 4 Min Read

The Principle of Least Privilege Explained (with Best Practices)

Learn why implementing the Principle of Least Privilege is crucial for limiting cyber risks and preventing unauthorized data breaches.