false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Learn 5 Min Read

CVE Severity & How To Respond To CVEs in Builds

CVEs can be serious enough to reject a build. These approaches and best practices help you assess CVE severity and determine how to manage a build.
Security 3 Min Read

3 Important German BSI Documents Every SIEM & SOC Manager Needs To Know About

The German IT Security Act 2.0 (IT-SiG 2.0) has been in force for some time now. Due to this new law, significantly more German companies have been classified as operators of critial infrastructures (KRITIS) than ever. This is a major cause of headaches for many managers. In addition, IT departments are starting to ask themselves: "Are we now regarded as KRITIS"? And if so, "What do we have to take into consideration?" Splunker Matthias Maier shares the 3 most important BSI documents every SIEM and SOC manager needs to know about.

Exploring Security and Observability on Splunk Lantern

Learn how the new Use Case Explorers can help you expand your Splunk environment to yield the best results as fast as possible.
Learn 4 Min Read

Kubernetes 101: How To Set Up “Vanilla” Kubernetes

Kubernetes 101: Set up the most basic K8s cluster — also known as Vanilla Kubernetes — with this hands-on tutorial that gets you started quickly and easily.
Platform 4 Min Read

Machine Learning at Splunk in Just a Few Clicks

Explore three new beta applications introduced at .conf22 that simplify complex and time consuming tasks while lowering barriers for customers to unlock the power of ML in everyday workflows.
Learn 4 Min Read

Network vs. Application Performance Monitoring: What's The Difference?

Monitoring networks and application performance are different practices. Understand the changes and see how, together, both can offer end-to-end observability.
Security 6 Min Read

Introducing Splunk Attack Range v2.0

The Splunk Attack Range project has officially reached the v2.0 release with a host of new features – get all the details from the Splunk Threat Research Team.
Learn 3 Min Read

Monitoring Windows Infrastructure: Tools, Apps, Metrics & Best Practices

Learn how to monitor your Windows infrastructure, including the best tools and apps to use, the top metrics to monitor and how to analyze those metrics.
Learn 5 Min Read

NoOps Explained: How Does NoOps Compare with DevOps?

Take a look at NoOps, the concept of automating IT and development: how it works, pros and cons and whether it’s an evolution — or the end — of DevOps.