false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Learn 6 Min Read

What Is IoT Security? A Complete Overview

IoT security is a threat protection mechanism and cybersecurity strategy that defends IoT devices against vulnerabilities.
Tips & Tricks 4 Min Read

Dashboard Studio: Tabbed Dashboards

In Splunk Cloud Platform 9.2.2406, Dashboard Studio introduces a number of new features that will streamline and improve your dashboard designing experience.
Learn 7 Min Read

Phishing Attacks: Protecting Against Them

Phishing attacks exploit social engineering to deceive victims into disclosing sensitive information or installing malware.
Learn 7 Min Read

SBOMs: Software Bill of Materials, Explained

The software bill of materials (SBOM) lists all component parts and software dependencies used in application development and delivery.
Security 17 Min Read

Handala’s Wiper: Threat Analysis and Detections

Cisco Talos and the Splunk Threat Research Team provide a comprehensive analysis that expands on existing coverage of Handala's Wiper and offers unique insights.
Global Impact 3 Min Read

Impact Bytes: Turning Data to Action to Fight Exploitation

Global Emancipation Network and Splunk use innovative data and AI solutions to rescue victims and change lives.
Global Impact 4 Min Read

London to Paris Cycle for Prostate Cancer - Day 3

After days of battling the elements, technical glitches, and plenty of laughs along the way, our incredible team of Splunkers has arrived at the Eiffel Tower and managed to complete their bike ride. Read all about it here.
Industries 2 Min Read

Expert Guidance for Fraud Detection and Prevention

Splunker Beverly Smart explains why your organization must be prepared to defend against fraud across your technical infrastructure.
Security 13 Min Read

ShrinkLocker Malware: Abusing BitLocker to Lock Your Data

The Splunk Threat Research Team shares their findings and methodologies to aid the cybersecurity community in combating ShrinkLocker effectively.