Skip to main content
false
Leadership
6 Min Read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

Security

Learn

Latest Articles

Leadership 3 Min Read

2023 Security Trends for APAC and the Evolving Role of CISOs

Splunk's Simon Davies shares a closer look at the changing role of security leaders and sheds light on the security trends we'll see for APAC in 2023.
Learn 2 Min Read

Splunk Light: An Introduction and Beginner's Guide

Looking for Splunk Light? This blog post explains in detail what Splunk Light was, what happened to Splunk Light, and much more.
Security 8 Min Read

CISA Top Malware Summary

This blog summarizes the Splunk Threat Research Team’s (STRT) recent review of the CISA Top 10 Malware strains for the year 2021 report.
Learn 4 Min Read

Splunk Universal Forwarder

In this blog post you can learn about Splunk Universal Forwarders - what they are, why to use them, how they work, and resources to get started.
Learn 4 Min Read

Is Blockchain Dead? No. Is Web3 Dead? Maybe.

This blog post explores trends around Web3, Blockchain, NFTs, Cryptocurrency, and related technologies.
Learn 7 Min Read

What is Cloud-Native Security? An Introduction

Understand how cloud native security can protect your organization's data and applications in the cloud. Explore the 4Cs and 3Rs principles plus get common strategies.
Observability 2 Min Read

Dos and Don’ts of Observability: Lessons Learned from RedMonk

Learn about the Dos and Don'ts of Observability in this post recapping a LinkedIn Live webinar with Splunk and RedMonk.
Leadership 2 Min Read

2022 Splunk Product Review

With a sharpened focus on delivering a unified security and observability platform, Splunk's Garth Fort takes a look back at our product highlights from the year.
Security 3 Min Read

Unknown and unseen, the cyberwar between Crimsonia and Berylia

First week of December, unbeknown to many the island of Berylia engaged in cyberwarfare with their neighbors Crimsonia after a number of months of heightened tensions. The goal of the Berylian attackers was to disable as many critical infrastructure components of the Crimsonian Ministry of Defense in order to prevent the Crimsonian Navy from sailing. This would give the Berylian fleet the time to aid and protect critical locations and assets.