false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Industries 2 Min Read

The Rise of Student-Powered Security Operations Centers (SOCs)

Splunker Frank Myers explains how the rise of student-powered SOCs is one of the new, innovative solutions to bolster cybersecurity defenses.
Observability 7 Min Read

Introducing the Observability Center of Excellence: Taking Your Observability Game to the Next Level

The Observability Center of Excellence (CoE) helps simplify and streamline your strategy and provides a framework to maintain and mature a leading observability practice.
Security 3 Min Read

Cybersecurity Awareness Is Not Just for Spooky Season

As October marks Cybersecurity Awareness Month, Splunker Mick Baccio reflects on the progress made over the past two decades.
Learn 4 Min Read

Introduction to Runbooks

Runbooks provide step-by-step IT guidelines, streamlining tasks, reducing errors, and enhancing efficiency, consistency, and automation in daily operations.
Learn 3 Min Read

What Is SecOps? Security Operations Defined

Security Operations, or SecOps, covers practically every aspect of security & IT operations. Get the latest on what SecOps means today, all right here.
Learn 5 Min Read

Security for Industrial Control Systems (ICS)

Industrial Control Systems (ICS) Security is defined as the defense of systems that govern industrial processes. Get the full picture here.
Learn 5 Min Read

An Introduction to Threat Monitoring

Discover threat monitoring, its importance in combating rising cyber risks, top tools, best practices, and how AI enhances real-time protection for your business.

Splunking GenAI Applications for Observability Insights

Splunker Jeff Wiedemann explains how Splunk Observability Cloud allows you to instrument GenAI apps to gain critical observability insights.
Security 11 Min Read

My CUPS Runneth Over (with CVEs)

This blog dissects the technical intricacies of the CUPS vulnerability, explores its potential impact on affected systems, and provides detection opportunities and mitigation strategies.