The latest and greatest from Splunk Observability to help keep your entire stack up and running, no matter where it’s deployed or who’s troubleshooting.
Announcing the latest feature enhancements in Splunk IT Service Intelligence (ITSI) 4.19, designed to operationalize the way organizations manage their IT services.
Vulnerability, threat and risk are three fundamental concepts in cybersecurity. Learn from industry experts how they differ and play out in IT environments.
A cyber kill chain framework can help organizations to better understand and combat attacks. Learn about the evolution and applications of the cyber kill chain.
Threat hunting is a proactive approach that harnesses human intuition and creativity to identify and counter security incidents that may otherwise go undetected.
Incident severity levels indicate how an incident impacts your customers, so you can prioritize and respond appropriately. Learn how to define and use them.
DoS attacks have a long history, but they’re also predicted to get worse in 2023. Find out the many ways they work and learn to prevent them in the first place.
Splunk Real User Monitoring (RUM), now generally available, leverages open source and OpenTelemetry standardization to help SREs and on-call engineers troubleshoot customer-facing issues faster, and optimize end-user experience.
Announcing the new Splunk Observability Cloud, bringing together the world’s best-in-class solutions for infrastructure monitoring, application performance management, digital experience monitoring, synthetic monitoring, log investigation and incident response.
Observability is not just metrics, traces, and logs. It is a mindset that lets you answer any question about your business through collection and analysis of data.
What do baseball and cybersecurity have in common? Nothing, at first glance. But, take a deeper look and you can see the glaring similarities. That's because cybersecurity is going through its Moneyball transformation right now. Read this blog post to learn more.
TruSTAR recently introduced API 2.O featuring TruSTAR Intel Workflows. This blog series will explain our motivations for building this feature, how it works, and how users can better inform security operations.
Discover how the Splunk Threat Research Team focused their research efforts on Clop Ransomware detections to help organizations detect abnormal behavior faster before it becomes detrimental.
In this installment of our 'Meet the Splunktern' series, we’re introducing Matthew Follegot, our Back-End Software Engineer Co-Op on the Security Analytics (UEBA Cloud) team. Read on to learn more about Matthew's virtual Splunktern experience!
In the first part of this 2-part-series we talked about recent additions to version 3.5 of the Deep Learning Toolkit for Splunk (DLTK). Here in part 2 we want to explain a few new algorithmic approaches available for time series analysis. These can be especially interesting for anomaly detection and time series prediction.
Financial crime has become a red-hot topic over the last 12 months, as fraudsters have sought to exploit the monitoring gaps between people, process and technology across an ever-widening attack surface – driven by the growth in usage of remote (digital) channels. But if you could fight financial crime with maths? Splunker Charles dives deeper into the methodology.