false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Security 3 Min Read

Splunk SOAR Playbook of the Month: Tackling Phishing Attempts with Identifier Reputation Analysis

Learn how you can use Splunk's identifier reputation analysis playbooks to implement a workflow that will help your team automate the alert and quarantine processes for potential threats based on key identifiers.
Security 11 Min Read

Do Not Cross The 'RedLine' Stealer: Detections and Analysis

The Splunk Threat Research Team provides a deep dive analysis of the RedLine Stealer threat and shares valuable insights to help enable blue teamers to defend against and detect this malware variant.
Learn 5 Min Read

The OSI Model in 7 Layers: How It’s Used Today

The OSI Model is not old news...In fact, it's still in use across the entire internet today! Read on to see exactly how these 7 layers work.
Security 3 Min Read

Staff Picks for Splunk Security Reading May 2023

Welcome to the Splunk staff picks, featuring a curated list of presentations, whitepapers, and customer case studies that our Splunk security experts feel are worth a read.
Learn 4 Min Read

Superapps: What They Are and How They Work

Approving and adopting new enterprise software is hard — superapps simplify the process by putting everything in one box, an ecosystem of tools in one interface
Splunk Life 2 Min Read

Splunk 2023 HBCU Academic Scholarship Recipients Selected

Announcing the recipients of the Splunk 2023 HBCU Academic Scholarship, awarded to 15 high-achieving students who demonstrate leadership in their field of study and a passion for diversity, equity, and inclusion.
Security 2 Min Read

OCSF Goes Into High Gear with Amazon Security Lake Launch and New OCSF Release Candidate

Splunk's Paul Agbabian shares two new major OCSF developments – the general availability of Amazon Security Lake and Splunk Add-On for AWS v.7.0, and Release Candidate 3 launching for public review.
Learn 4 Min Read

What Are TTPs? Tactics, Techniques & Procedures Explained

Analyzing a threat takes a robust and comprehensive lens. Digging into the tactics, techniques, and procedures of a given cyber-attack can help us stay prepared.
Learn 9 Min Read

Product Analytics 101: Definition, Metrics & Tools

Maximizing the quality and performance of a product doesn't end at launch — product analytics allow us to monitor and act on data to refine and optimize services