false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Partners 4 Min Read

Elevate Your Security Program with Splunk and Tenable

Tenable and Splunk built an integration that combines security logs, behavioral data and threat intelligence from Splunk with cyber exposure insights—data on assets, vulnerabilities, misconfigurations and unpatched components—from Tenable.
Learn 4 Min Read

Data Aggregation: How It Works

Without aggregation, insights from a given data set will lack value and accuracy. Aggregation is the first step toward unlocking the story behind the numbers.
Tips & Tricks 2 Min Read

Administer Your Splunk Cloud Stacks Easily and Efficiently with ACS Helper for Splunk

Administer your Splunk Cloud instances more easily with ACS Helper for Splunk. This free app is now available on Splunkbase.
Learn 7 Min Read

SQL vs. NoSQL Today: Databases, Differences & When To Use Which

Trying to decide on the right database type? SQL and NoSQL each have their own pros and cons, from relational to schema-less, to vertical and horizontal scaling.
Learn 8 Min Read

SOC Metrics: Security Metrics & KPIs for Measuring SOC Success

Maintaining a keen eye on SOC success is critical in any security operation. Join us as we discuss common KPIs, and how to leverage metrics for improvement.
Learn 4 Min Read

Outputs vs. Outcomes: Understanding the Differences

Measuring success is no small equation: correctly assessing outputs versus outcomes can help us get it right. Join us to explore the key differences between the two.
Learn 10 Min Read

Red Teams vs. Blue Teams: What’s The Difference?

Effective cybersecurity is a group effort - better yet, a multi-group effort. Learn how the Red Team Blue Team approach tackles security from both angles.
Security 10 Min Read

Trust Unearned? Evaluating CA Trustworthiness Across 5 Billion Certificates

In this blog post, we dive into our recent research project, in which the Splunk SURGe team analyzed more than five billion TLS certificates to find out if the CAs we rely on are really worthy of our trust.
Security 9 Min Read

Model-Assisted Threat Hunting (M-ATH) with the PEAK Framework

Welcome to the third entry in our introduction to the PEAK Threat Hunting Framework! Taking our detective theme to the next level, imagine a tough case where you need to call in a specialized investigator. For these unique cases, we can use algorithmically-driven approaches called Model-Assisted Threat Hunting (M-ATH).