false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Splunk Life 4 Min Read

Splunker Stories: Alexandra Nuttbrown

In our latest edition of our 'Splunker Stories' series, we meet with one of Splunk’s Senior Product Designers, Alexandra (Lexi) Nuttbrown.
Tips & Tricks 3 Min Read

Dashboard Design: Getting Started With Best Practices (Part 1)

Learn how to design and build effective Splunk dashboards to drive data insights with these helpful principles and dashboard templates.
Leadership 3 Min Read

What I Learned from Meeting 100 Customers in 100 Days

Splunk CEO Gary Steele shares his top takeaways from his first 100 customer conversations, including what he learned about the challenges organizations are facing and how Splunk can help them put their data to use.
Observability 3 Min Read

Splunk APM Expands Code Profiling Capabilities with Several New GAs

We’re excited to share new Splunk capabilities to help measure how code performance impacts your services – Splunk APM’s AlwaysOn Profiling now supports .NET and Node.js applications for CPU profiling and Java applications for memory profiling.
Splunk Life 1 Min Read

Meet the Splunktern: Majd Khadra

In this next installment of our 'Meet the Splunktern' series, we're featuring Majd Khadra, our Software Development Engineering Co-Op.
Observability 4 Min Read

Using Splunk Observability Cloud to Monitor Splunk RUM

Discover how the Splunk RUM team used the Splunk Observability Cloud to detect and resolve a critical incident in production.
Industries 7 Min Read

Harmonizing the Federal Effort on Automating Software Bill of Materials

E.O. 14028 issued guidance to enhance the nation’s software supply chain security, to include the approaching requirement of an SBOM within federal acquisitions.
Observability 3 Min Read

Snowflake DB: Observing a Snowflake From Cloud to Chart

Gain insight into your Snowflake Database usage with Splunk Observability dashboards and detectors.
Security 24 Min Read

AppLocker Rules as Defense Evasion: Complete Analysis

The Splunk Threat Research Team analyzes 'Azorult loader' (a payload that imports its own AppLocker rules) to understand the tactics and techniques that may help defend against these types of threats.