false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Tips & Tricks 8 Min Read

CI/CD Automation for Splunk Apps using Github Actions

Splunker Patrick King explains how to replace local, by-hand app development with a fully source-controlled, CI/CD-automated workflow.
Security 3 Min Read

Macro ATT&CK for a TTP Snack

Splunk's Mick Baccio and Ryan Fetterman explore 2024's macro-level cyber incident trends through the lens of the MITRE ATT&CK framework.
Learn 15 Min Read

What Is Network Configuration?

In this post, we'll do a deep dive into network configuration and include best practices for keeping networks up and running
Security 3 Min Read

Introducing Splunk Attack Range v3.1

The Splunk Threat Research Team is happy to release v3.1 of Splunk Attack Range.
Security 3 Min Read

Vulnerability Prioritization Is a Treat for Defenders

There have been numerous high-profile cybersecurity incidents where vulnerability management had an impact on severe breaches – here are some notable examples.
Learn 11 Min Read

Data Encryption Methods & Types: A Beginner's Guide

In this article, we'll discuss data encryption methods including symmetric and asymmetric encryption, common algorithms, and best practices.
Learn 9 Min Read

Top 11 Cloud Certifications: A Buyer's Guide

Cloud certifications are now essential for software professionals to stay updated with the latest technologies and showcase their expertise.
Security 14 Min Read

PowerShell Web Access: Your Network's Backdoor in Plain Sight

The Splunk Threat Research Teams dives deep into PowerShell Web Access (PSWA) exploring its functionality within the context of cyber threats.
Splunk Life 2 Min Read

Leading with Purpose: Navigating Challenges and Inspiring Leadership in Splunk

Edwin Seo, AVP, Asia Solutions Engineering, shares his strategy for successfully leading his team through change at Splunk.