false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Industries 5 Min Read

Splunk’s Path Towards Achieving FedRAMP Moderate Authorization for Splunk Observability

Splunk VP of Public Sector Bill Rowan shares how we plan on actively pursuing a FedRAMP Moderate authorized Splunk Observability Cloud offering.
Security 4 Min Read

Paving the Way for Unified Cybersecurity: OCSF Joins the Linux Foundation with Splunk’s Support

Unified cybersecurity takes a step forward as OCSF joins the Linux Foundation, backed by Splunk’s support.
Security 1 Min Read

Splunk Enterprise Security 8.0: Customer Feedback

Splunk Enterprise Security 8.0 delivers unified workflows, alert aggregation, and detection versioning to empower security teams, shaped by customer feedback.
Learn 12 Min Read

AppSec Today: Application Security Requirements & Guidelines To Know

Explore the essential aspects of application security: threats, requirements, and best practices. Learn how to safeguard your applications and data effectively.
Learn 4 Min Read

Recovery Point Objective (RPO) vs. Recovery Time Objective (RTO): What’s The Difference?

For online services and products, availability is the name of the game. Learn what RPO and RTO mean for availability — and how to set them for your organization.
Partners 2 Min Read

Splunk Now Generally Available on Microsoft Azure

Splunk arrives on Microsoft Azure, giving the vast majority of Fortune 2000 companies an easier way to enable enterprise-grade security and observability.
Learn 4 Min Read

What is Cloud Native Application Protection Platform: Everything You Need to Know

Learn what the Cloud Native Application Protection Platform (CNAPP) is and how it works to secure cloud applications.
Splunk Life 3 Min Read

Life as a Software Engineer Intern at Splunk

Discover life as a Splunk Software Engineer intern with Thomas Payton, Juanchi Flores, and Christina Liang.
Learn 10 Min Read

What's The CIA Triad? Confidentiality, Integrity, & Availability, Explained

The CIA security triad guides information security strategies to inform areas like security framework implementation and cyber threat.