MachineGPT brings the power of generative AI to one of the most overlooked resources: machine data. Splunk SVP & GM Kamal Hathi explains why mastering data as the heartbeat of the digital world is a game changer.
Splunk announces a donation to the OpenTelemetry project that will help solve the challenges of implementation for everyone — the OpenTelemetry Injector.
The latest articles from Splunk, straight to your inbox
Splunk's Kamal Hathi recaps our innovation highlights from .conf25, marking a pivotal moment for Splunk and Cisco as we deliver significant new value to our customers that make the use of AI a practical reality in their organizations.
At .conf25, we unveiled new capabilities in Splunk Observability Cloud that redefine digital resilience in the AI era with smarter detection and investigation of business-critical issues.
Announcing a transformative update to Splunk Enterprise Security (ES) with 8.2: An AI-powered SecOps platform designed to unify and accelerate threat detection, investigation, and response (TDIR) in one seamless experience.
Large language models have changed the world. What about small language models? Learn what SLMs are, how they differ from LLMs, and why SLMs are the future.
Telemetry is powerful data that can tell you all sorts of important information. Know what you can do with this useful data — get the full telemetry 101 here.
In this article, let’s look at SaaS security: what it is, the most common threats to SaaS and actionable best practices for securing SaaS applications.
Discover insights from the Splunk Threat Research Team on Microsoft 365 threat detection, focusing on data source analysis and effective methods for hunting initial access threats.
In this blog post, we'll take a look at the basics of Google Dorking (AKA Google Hacking), how it can impact your organization, and steps you can take to mitigate this risk.
We're excited to announce the release of the Splunk App for Behavioral Profiling 2.0 with a variety of capabilities providing enhancements across the application workflow in response to customer feedback.
Become a a well-rounded cybersecurity professional with these must-have skills! You'll tackle the ever-evolving threat landscape and protect sensitive information.
Explore the differences between OT security and IT security, delving into industry-specific challenges and solutions, with insights into the Purdue Model and how Splunk can help.