Splunk's Kamal Hathi recaps our innovation highlights from .conf25, marking a pivotal moment for Splunk and Cisco as we deliver significant new value to our customers that make the use of AI a practical reality in their organizations.
Announcing a transformative update to Splunk Enterprise Security (ES) with 8.2: An AI-powered SecOps platform designed to unify and accelerate threat detection, investigation, and response (TDIR) in one seamless experience.
At .conf25, we unveiled new capabilities in Splunk Observability Cloud that redefine digital resilience in the AI era with smarter detection and investigation of business-critical issues.
Kamal Hathi shares how Cisco and Splunk are helping organizations manage the explosion of machine data and AI-driven complexity, delivering real-time digital resilience to counter threats at machine speed and scale.
Announcing the general availability of Splunk Enterprise 10.0 and Splunk Cloud Platform 10.0, the most secure, stable, and modernized platform for a digitally resilient, compliance-ready future.
Splunk's enhanced UEBA capability, now natively available in ES, empowers SOCs to transition from reactive, fragmented workflows to a proactive, behavior-driven security posture.
Introducing AI Infrastructure Monitoring and AI Agent Monitoring in Splunk Observability Cloud and AppDynamics LLM Monitoring – providing visibility and protection across your AI stack.
The updated AppDynamics Agent provides customers with a common agent to collect telemetry data for use in either Splunk AppDynamics or Splunk Observability Cloud.
Large language models have changed the world. What about small language models? Learn what SLMs are, how they differ from LLMs, and why SLMs are the future.
Telemetry is powerful data that can tell you all sorts of important information. Know what you can do with this useful data — get the full telemetry 101 here.
As we gear up to the summer F1 races with Canada this weekend before F1 heads to Europe, we sat down with Lando Norris and new McLaren driver Oscar Piastri to discover what makes them both tick on and off the track.
Learn how purple teams bridge the gap between offensive and defensive security strategies, and are helping organizations identify and mitigate risks effectively
Discover the fundamental differences between authentication and authorization, explore techniques, and best practices to implement robust security measures.
Everything you do on the internet leaves behind pieces of data, these make up your digital fingerprint. Here's what to know about managing your privacy online.
Fending off cyberattacks requires preemptive action. Automating and controlling patch deployment helps safeguard against vulnerabilities in your IT systems.
From predictive modeling to AI-driven systems, data scientists harness data to make informed decisions and drive innovation. Here's all you need to know about the role.