false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Observability 4 Min Read

How I fell in love… with Data Governance (no, really)

It’s a romantic story, and I never worried about compliance again. You need Data Governance more than it needs you!
Security 3 Min Read

Splunk Unified Security Operations for Digital Resilience at RSA Conference 2023

Splunk is excited to be joining the cybersecurity community back at the Moscone Center in April for RSA Conference 2023, and to share how we can help unify, simplify and modernize your security operations.
Learn 7 Min Read

The Digital Resilience Guide: 7 Steps To Building Digital Resilience

When faced with major changes and cyberattacks, digital resilience ensures our systems can bounce back. See more, react fast. With digital resilience.
Learn 4 Min Read

SOC 1, 2, 3 Compliance: Understanding & Achieving SOC Compliance

Discover how SOC compliance can give your business a competitive edge and assure your clients to trust your organization with their sensitive data.
Learn 6 Min Read

The ISO/IEC 27001 Standard for Information Security

Is there a standard for ensuring information security? There sure is, and it’s known as ISO/IEC 27001. Get the latest & greatest information here.
Security 5 Min Read

Baselining and Beyond: What's New in OT Security Add-On v2.2

Splunk has released a new version of OT Security Add-On, designed to help organizations understand their cybersecurity risks, improve their security monitoring, and better detect and react to industrial cybersecurity threats.
Learn 5 Min Read

FedRAMP® Compliance: What It Is, Why It Matters & Tips for Achieving It

Learn about FedRAMP® compliance, the security standard to protect the federal government’s most sensitive unclassified data in the cloud.
Splunk Life 2 Min Read

March 2023 Living Our Values Award Winners

Congratulations to the five Splunkers and one team who truly embody our core values as a company!
Learn 6 Min Read

Credential Stuffing: How To Prevent It

One more reason to NOT reuse passwords! Credential stuffing is the most common cyberattack today. Read here for expert details on how to stop these attacks.