The latest and greatest from Splunk Observability to help keep your entire stack up and running, no matter where it’s deployed or who’s troubleshooting.
Announcing the latest feature enhancements in Splunk IT Service Intelligence (ITSI) 4.19, designed to operationalize the way organizations manage their IT services.
Vulnerability, threat and risk are three fundamental concepts in cybersecurity. Learn from industry experts how they differ and play out in IT environments.
A cyber kill chain framework can help organizations to better understand and combat attacks. Learn about the evolution and applications of the cyber kill chain.
Threat hunting is a proactive approach that harnesses human intuition and creativity to identify and counter security incidents that may otherwise go undetected.
Incident severity levels indicate how an incident impacts your customers, so you can prioritize and respond appropriately. Learn how to define and use them.
DoS attacks have a long history, but they’re also predicted to get worse in 2023. Find out the many ways they work and learn to prevent them in the first place.
Our Splunk Security experts provide some context, clarity and solutions for Splunk customers around the world following the cybersecurity advisory released by the FBI and NSA disclosing the details of a new Linux rootkit named Drovorub.
From investigating security incidents to triaging alerts and identifying data threats, security analysts play a pivotal role in thwarting organizational cybersecurity threats.
As if you already weren't excited enough for .conf20! We're highlighting some of the top IT Operations tracks, filled with customers and partners ready to tell their digital transformation stories.
This summer, University Recruiting teamed up with Splunk for Good and the Splunk Education Team to host the annual Splunk for Splunkterns competition, using Splunk and data for social good.
Splunk's Frank Dimina breaks down how JADC2 provides a necessary evolution for the armed forces, operationalizing battlefield data while enabling more confident, rapid decision making by military leaders.
For .conf20, the SplunkTrust track consists of deeply technical sessions submitted and chosen by the members of the SplunkTrust. Splunk's Jason Hupka shares three of his favorites and additional insight on how to register.