Skip to main content
false
Leadership
6 min read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

.conf24

.conf & .conf Go
1 min read
Congratulations to all of the 2024 Splunkie Award winners announced at .conf24!
.conf & .conf Go 2 Min Read

Data Integration for Higher Education: An NJIT and Splunk Case Study

With Splunk, NJIT can combine disparate streams of event, academic and infrastructure data to bolster physical and digital security across the campus.
.conf & .conf Go 2 Min Read

Announcing the 2024 Splunk Partner Awards Winners!

Congratulations to the 2024 Splunk Partner Awards winners and our entire partner community on an outstanding year!
.conf & .conf Go 3 Min Read

Supercharge Insights with Generative AI: Splunk AI Assistant for SPL is now GA

Announced at .conf24, Splunk AI Assistant for SPL is now available globally for Splunk Cloud users.
.conf & .conf Go 3 Min Read

Cisco and Splunk Bring Full-Stack Observability to the Entire Enterprise

Splunk has teamed up with Cisco to deliver engineers and ITOps teams with an improved leading observability experience.

Learn

Latest Articles

Learn 4 Min Read

Endpoints and Endpoint Detection: Importance & Risk Mapping

Endpoints sound like an afterthought...not like the most important part of your cybersecurity posture. Learn what endpoints are, and why detecting them is so important.
Learn 6 Min Read

Endpoint Security Explained

Discover the role of endpoint security in protecting network integrity. This guide shares insights into implementing robust security measures for effective cyber defense.
Learn 5 Min Read

AI Bill of Rights: What Does It Mean?

In this blog post, we will delve into what the AI Bill of Rights is, its key principles, and the future of AI regulation in the United States.
Learn 4 Min Read

What is a Computer Server?

Computer servers do indeed serve: they serve up compute power and data! Get the full server story in this in-depth article.
Learn 7 Min Read

Continuous Threat Exposure Management (CTEM)

Attack surfaces changing daily? Cyber threats on the rise? Old ways of working ain't cutting it? CTEM may be your cyber solution. Get the full story here.
Learn 6 Min Read

The SaaS Security Guide: Best Practices for Securing SaaS

In this article, let’s look at SaaS security: what it is, the most common threats to SaaS and actionable best practices for securing SaaS applications.
Security 17 Min Read

Hunting M365 Invaders: Blue Team's Guide to Initial Access Vectors

Discover insights from the Splunk Threat Research Team on Microsoft 365 threat detection, focusing on data source analysis and effective methods for hunting initial access threats.
Learn 6 Min Read

Shadow IT & How To Manage It Today

Shadow IT exists for a few reasons: is one side more right? Is there a middle ground? Get the full story from IT expert Joseph Nduhiu in this article.
DevOps 5 Min Read

The Importance of Traces for Modern APM [Part 2]

In the second part of this blog we will explore how increased entropy forces us to rethink what is required for monitoring.