The latest and greatest from Splunk Observability to help keep your entire stack up and running, no matter where it’s deployed or who’s troubleshooting.
Announcing the latest feature enhancements in Splunk IT Service Intelligence (ITSI) 4.19, designed to operationalize the way organizations manage their IT services.
Vulnerability, threat and risk are three fundamental concepts in cybersecurity. Learn from industry experts how they differ and play out in IT environments.
A cyber kill chain framework can help organizations to better understand and combat attacks. Learn about the evolution and applications of the cyber kill chain.
Threat hunting is a proactive approach that harnesses human intuition and creativity to identify and counter security incidents that may otherwise go undetected.
Incident severity levels indicate how an incident impacts your customers, so you can prioritize and respond appropriately. Learn how to define and use them.
DoS attacks have a long history, but they’re also predicted to get worse in 2023. Find out the many ways they work and learn to prevent them in the first place.
The Splunk Threat Research Team has assessed several samples of Trickbot, a popular crimeware carrier that allows malicious actors to deliver multiple types of payloads. Use our pre-built Splunk detections to detect Trickbots.
We're diving into three different methods operators can use to ingest Google Cloud asset inventory data into Splunk, along with outlining detailed setup instructions and pointers so customers can get started today.
TruSTAR announces new features making intelligence more actionable by simplifying intelligence ingestion, automating data flows and better informing SIEM, SOAR and Vulnerability Management programs.
We’re excited to share that the Splunk Federated Search is now generally available starting in Splunk Cloud Platform 8.1.2103 and Splunk Enterprise 8.2! Get an introduction to Federated Search and see how you can enjoy a unified search experience across your data ecosystem.
Splunk's Tedd Hellmann walks you through the changes and additions we've made to the cloud vetting process to help ensure apps running on Splunk Cloud are 'up to snuff.'
In this post, we trace the history of real user monitoring (RUM) tools and argue that we're again on the precipice of change, where legacy RUM tools are no longer good enough for new users and their needs.
We’re thrilled to announce the release of the Splunk App for Content Packs, an app that acts as a one-stop shop for prepackaged content and out-of-the-box searches and dashboards for common IT infrastructure monitoring sources, making it easy to get up and running with Splunk for IT use cases.