The latest and greatest from Splunk Observability to help keep your entire stack up and running, no matter where it’s deployed or who’s troubleshooting.
Announcing the latest feature enhancements in Splunk IT Service Intelligence (ITSI) 4.19, designed to operationalize the way organizations manage their IT services.
Vulnerability, threat and risk are three fundamental concepts in cybersecurity. Learn from industry experts how they differ and play out in IT environments.
A cyber kill chain framework can help organizations to better understand and combat attacks. Learn about the evolution and applications of the cyber kill chain.
Threat hunting is a proactive approach that harnesses human intuition and creativity to identify and counter security incidents that may otherwise go undetected.
Incident severity levels indicate how an incident impacts your customers, so you can prioritize and respond appropriately. Learn how to define and use them.
DoS attacks have a long history, but they’re also predicted to get worse in 2023. Find out the many ways they work and learn to prevent them in the first place.
Participating in Splunk Boss of the NOC at .conf20? Grab some headphones and get in the zone, because Matt Davies curated a pun-tastic playlist to get you fully immersed in the event experience.
One of the exciting aspects of .conf is that there is something for everyone, with special trakcs and sections designed specifically for our public sector customers. Learn more about the top federal sessions to attend this .conf20.
Splunk is being used at Compassion International to protect millions of children from sexual predators and other bad actors. Take a look at what’s going on behind the scenes and how Splunk for Good is helping.
Whether you’re an enthusiastic .conf veteran or an eager n00b, this highly engaging event will empower you to fully Rock the Data Age with the Splunk community.
Splunk's Bill Talbot highlights video's from Splunk's Kia Behnia where he answers the most popular questions around AIOps including what it is and why organizations should care.
We recently hosted a virtual Splunk Boss of the SOC EMEA Virtual Edition. Find out who was able to claim a podium a spot and what Splunk BOTS is all about in this blog post.
Google Cloud Platform's Identity Access Management (IAM) permissions can be used to move laterally and escalate privileges. Learn how to detect GCP OAuth token abuse and remediate these events with Splunk.