The latest and greatest from Splunk Observability to help keep your entire stack up and running, no matter where it’s deployed or who’s troubleshooting.
Announcing the latest feature enhancements in Splunk IT Service Intelligence (ITSI) 4.19, designed to operationalize the way organizations manage their IT services.
Vulnerability, threat and risk are three fundamental concepts in cybersecurity. Learn from industry experts how they differ and play out in IT environments.
A cyber kill chain framework can help organizations to better understand and combat attacks. Learn about the evolution and applications of the cyber kill chain.
Threat hunting is a proactive approach that harnesses human intuition and creativity to identify and counter security incidents that may otherwise go undetected.
Incident severity levels indicate how an incident impacts your customers, so you can prioritize and respond appropriately. Learn how to define and use them.
DoS attacks have a long history, but they’re also predicted to get worse in 2023. Find out the many ways they work and learn to prevent them in the first place.
From Splunkterns, for Splunkterns! Splunk's Corporate Communications Intern, Elly Lee, interviews five Splunkterns in various departments to get some insight into their 2020 internship experience.
The best things come in threes and for the third year in a row, Splunkers down-under will take to the (virtual) thunderdome to battle it out for supreme bragging rights in the Australia & New Zealand Boss of the SOC (BOTS) Day held on August 20, 2020.
In the midst of the crisis, we at Splunk have had the privilege of helping our customers achieve inspiring outcomes — from facilitating learning to supporting global economies to scaling care to those who need it most.
We're excited to share with you this preview of the new Splunk4U track at this year’s .conf20, consisting of 14 sessions with topics perfect for practitioners and leaders alike
Where Graphite has limitations in scale, maintenance, ease of use, flexibility, alerting, and cost, Splunk Infrastructure Monitoring was built specifically for today's distributed, elastic environments.
In part 2 of our 3-part series, we walk you through how to use Splunk Security-Content, Attack Range and CircleCI to do detection development, continuous testing and deployment as a workflow in your SOC.
In part two of this series, we're diving into different serverless functions that can help facilitate data in between Github and Splunk, and potential security benefits that result from this.
Splunk's Bill Talbot discusses the importance of a holistic and contextual approach to business operations in order to have a significant impact on the quality of service delivery, and end-user experience on the customer.