Skip to main content
false
Leadership
6 Min Read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

Security

Learn

Latest Articles

Learn 5 Min Read

CSIRTs: Computer Security Incident Response Teams

A major security incident happens: you need to minimize the impact and restore normality ASAP. The best way to do it? The CSIRT. Get all the details about this team.
Partners 2 Min Read

We’re Open! The Splunk Immersive Experience, powered by AWS is officially launched

The newly launched Splunk Immersive Experience brings to life the tangible customer problems Splunk and AWS help to solve through a guided journey of industry specific use cases and challenges. Showing new and emerging ways to get the most out of both Splunk and AWS.
Industries 5 Min Read

Exploring DORA: Why creating a path to resilience maturity is a critical success factor for financial services organisations

In this blog, we share some insights about the requirements of DORA, as well as how Splunk can support financial services organisations on their resilience journey.
Industries 2 Min Read

Splunk Aims To Provide a Secure Cloud Solution to the Federal Government With an 'In Process' Status for FedRAMP® High Authorization

Splunk continues its commitment to the Federal Government by achieving an 'In Process' designation from the Federal Risk and Authorization Management Program (FedRAMP) Program Management Office (PMO) as it works towards FedRAMP High authorization.
Learn 4 Min Read

Ransomware Families & RaaS Groups

Every 19 seconds a ransomware attack launches. Are these standalone attacks? Are they operating within a ransomware family of shared knowledge? Find out here.
Learn 4 Min Read

Introduction To Key Management

A crucial part of cryptography and cybersecurity, key management is how you share secret key knowledge that enables secure communications over the network.
Learn 7 Min Read

Threat Hunting vs. Threat Detecting: What's The Difference?

Hunting threats, detecting threats. Sounds the same — but they are not! Get tons of info (+ free resources) for prevention methods that underpin cybersecurity.
Leadership 6 Min Read

Leadership differentiation opportunities in 2023

Irrespective of the prediction, trend or new amazing technology, its impact is only realised when successfully deployed by an organisation’s expert team(s). To help, I’ve captured just a few of my thoughts for how leaders can differentiate some broad demands to make the best impact in the year to come.
Learn 3 Min Read

The Triple DES Intro: Triple Data Encryption Standard

Triple DES is an encryption standard that’s NIST-approved for use through 2030. Let’s see how it works and when you want — and don’t want — to use it.