One approach to a cybersecurity strategy, cyber hygiene is the way of creating a structured, intelligent environment that reduces the risk of contamination.
Every month, our Splunk staff of security experts share their favorite reads of the month — this way, you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Large language models have changed the world. What about small language models? Learn what SLMs are, how they differ from LLMs, and why SLMs are the future.
Telemetry is powerful data that can tell you all sorts of important information. Know what you can do with this useful data — get the full telemetry 101 here.
Welcome to the Splunk staff picks blog. Each month, Splunk security experts curate a list of presentations, whitepapers, and customer case studies that we feel are worth a read.
Introducing the new SPL2 Search Experience for Splunk Cloud, accelerating the data-to-insight workflow, and bringing the power of Splunk to everyone – learn more here.
Discover how to use machine learning algorithms to develop methods for detecting misuse or abuse of risky SPL commands to further pinpoint a true security threat.
Understand trunk-based development and GitFlow, two source code management approaches, so you can decide which is right for your developer environment.
Get a grip on your Observability world with a 10,000ft view of usage and uptake with free Executive Dashboards from the Splunk Observability Content Contribution repository.
Trunk-based development is a popular way to control source code when developing apps. Learn how TBD works, how it supports CI/CD, and when to avoid it.
Owning observability telemetry data has many benefits. This article explains why OpenTelemetry is the right way to own this data instead of relying on a vendor.