One approach to a cybersecurity strategy, cyber hygiene is the way of creating a structured, intelligent environment that reduces the risk of contamination.
Every month, our Splunk staff of security experts share their favorite reads of the month — this way, you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Large language models have changed the world. What about small language models? Learn what SLMs are, how they differ from LLMs, and why SLMs are the future.
Telemetry is powerful data that can tell you all sorts of important information. Know what you can do with this useful data — get the full telemetry 101 here.
Network security monitoring sounds like other security measures like intrusion detection. Find out why it's not — and what makes it so useful for IT today.
How do you collect and send your data to an Observability tool? Learn more about what OpenTelemetry is and how it makes this question easier to answer.
Perhaps unsurprisingly, cybercrime is now available for hire. Harnessing the ‘as a service’ model, find out how cybercrime can be enacted by practically anyone.
Don’t just guess your risk profile — assess it! Learn about cybersecurity risk management and apply these 5 steps to turn the process into an ongoing practice.
We’re excited to share that Splunk FileLink is now available to all Splunk AR customers! This makes securely accessing your information in Splunk AR easier allowing you to reduce MTTR.