false
Splunk Blogs
Leadership
6 Min Read
Splunk announces innovations across its observability portfolio to provide organizations deeper visibility into their network health through integrations with Cisco, and faster troubleshooting with the help of AI.

Featured Articles

Security

Learn

Latest Articles

Security 9 Min Read

Model-Assisted Threat Hunting (M-ATH) with the PEAK Framework

Welcome to the third entry in our introduction to the PEAK Threat Hunting Framework! Taking our detective theme to the next level, imagine a tough case where you need to call in a specialized investigator. For these unique cases, we can use algorithmically-driven approaches called Model-Assisted Threat Hunting (M-ATH).
Industries 3 Min Read

Fighting Fraud, Waste, and Abuse in Government

Leveraging Splunk's ability to correlate events helps investigators detect patterns and anomalies across multiple data sets that are difficult to see using spreadsheets or traditional Business Intelligence tools
Learn 6 Min Read

Cloud Cryptomining: How It Works & How To Minimize Risk

Are the days of setting up expensive cryptomining rigs over? Learn how cloud cryptomining brings cost reduction, scalability and efficiency to cryptocurrency mining.
Learn 6 Min Read

What Is DPE? Developer Productivity Engineering Explained

With rising expectations for development turnaround, DPE processes are key in maintaining quality, speed and a satisfying developer experience.
Observability 2 Min Read

The State of Observability 2023: Realizing ROI and Increasing Digital Resilience

Splunk has published The State of Observability 2023 — a research report created in partnership with ESG — to understand best practices, challenges and trends across the observability landscape.
Industries 6 Min Read

Helping Law Enforcement with Call Detail Records

This blog gives Splunker Nimish Doshi's history with CDRs at Splunk and a tip on how to correlate CDRs for catching nefarious behavior.

Splunk Reddit Crosses 15,000 Strong

Splunk's subreddit on reddit.com has crossed the 15,000 user line! This blog is celebrating that fact with handy links, ideas, and topics.
Learn 5 Min Read

Cyberattack Maps Explained: The Value & Limitations of Cyber Attack Maps

Cyberattack maps are powerful tools in preparing a robust cybersecurity approach, here's what to keep in mind when visualizing the latest threats.
Learn 7 Min Read

Programming Languages: Today's Ultimate Guide

Looking to become a developer, but not sure where to start? We've put together the definitive guide to learning programming in 2023