false
Splunk Blogs
Observability
3 Min Read
Splunk releases its newest report, State of Observability 2025: The Rise of a New Business Catalyst.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Learn 6 Min Read

What is a DBMS (Database Management System)?

Getting started with databases? From relational, to object-orientated, here's our beginner's guide to Database Management Systems!
Leadership 2 Min Read

Standing Up for the Global Free Flow of Data

Globalisation is being put into question; geopolitics has never generated so much uncertainty; digitalisation is seen as an opportunity, but also as a new source of risks. As part of these trends, we see the emergence of more and more barriers to the global free flow of data, particularly in the form of local data storage requirements.
Security 3 Min Read

Splunk Field Hashing & Masking Capabilities for Compliance

Satisfy internal and external compliance requirements using Splunk standard components.
Learn 5 Min Read

Typosquatting & How To Prevent It

When it comes to security, every detail matters. Typosquatting turns small errors into big consequences, here's what to look out for.
Learn 6 Min Read

SAML & SAML Authentication, Explained

SSO makes authentication and authorization a breeze — SAML makes it possible. Read our crash course to learn how!

Splunk Wins 24 TrustRadius Top Rated Awards

We’re thrilled to announce that our customers are once again showing us big love! Splunk has earned twenty-four 2023 Top Rated Awards from TrustRadius.
Learn 7 Min Read

What are Bug Bounty Programs?

Worried you're missing hard to spot bugs? Learn how organizations leverage ethical hackers to squash bugs with bug bounty programs.
Security 5 Min Read

Security Content from the Splunk Threat Research Team

The blog explains how STRT develops Splunk Security Content, aiding detection engineering and threat research teams to efficiently detect and respond to potential threats, using ESCU App amidst growing security incidents and system complexity.
Security 9 Min Read

Hypothesis-Driven Hunting with the PEAK Framework

Details on hypothesis-driven threat hunting with the PEAK framework.