false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Industries 6 Min Read

From Data to Delivery: How Splunk Powers Proactive Supply Chain Management

Splunker Young Cho dives into why monitoring supply chain systems is crucial and how doing so can help the smooth functioning of your supply chain.
Splunk Life 2 Min Read

Advancing Diversity and Inclusion at Splunk: An Introduction to Our Womxn+ ERG Community Initiatives

At Splunk, we have a community known as the Womxn+ Employee Resource Group (Womxn+ ERG). By placing a strong emphasis on diversity and inclusion, Splunk aims to create a more positive and enriching environment for employees, the company, and the wider community. We share highlights from our first internal Womxn+ ERG event in Japan.
Security 3 Min Read

Announcing the General Availability of Splunk® Enterprise Security 8.0

We are thrilled to announce Splunk Enterprise Security 8.0 is now generally available.
Learn 6 Min Read

How To Write SMART Goals: The SMART Guide

You’ve heard of SMART goals, but how do you write them? Learn how in this in-depth article, useful for both workplace and personal goalsetting.
Global Impact 3 Min Read

Impact Bytes: Bolstering Democracy Through Data

Meet three nonprofits using data to empower citizens and strengthen accountability.
Security 3 Min Read

Cybersecurity Awareness Month Spotlight: Insights from the Cisco Talos & SURGe Teams

The Cisco Talos and SURGe by Splunk teams gathered for a special episode of Talos Takes filled with engaging cybersecurity discussions and candid opinions.
Splunk Life 3 Min Read

Meet the Splunktern: Alexander De Laine

Alexander De Laine, a Digital Sales Intern from Sydney, AU, shares a peek into his day and his projects in our Meet the Splunktern series.
Learn 4 Min Read

What’s Reliability? Reliability Metrics To Know

These top reliability metrics indicate where organizations should focus in order to support reliability requirements for uptime and performance.
Learn 6 Min Read

Cybersecurity Policies: Types & Best Practices

Learn how to structure effective cybersecurity policies to protect critical systems, address evolving threats, and meet regulatory obligations.