false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Global Impact 4 Min Read

London to Paris Cycle for Prostate Cancer - Day 2

Our Splunkers are officially two days into their epic journey from London to Paris, and what a day it was! With sore legs, aching muscles, and a few bumps along the way, the riders are now in full swing with the end in sight as they navigate the beautiful countryside of France. Read more about the events of Day 2 here.
Learn 6 Min Read

Fusion Teams: What Are They?

Fusion teams, also known as cross-functional or interdisciplinary teams, come together to work on a specific project or initiative. Get the full story here.
Learn 7 Min Read

Redundancy vs. Resiliency in IT: What’s The Difference?

In IT systems, redundancy and resiliency are often talked about together and you can’t have one without the other. Get the full story here.
Global Impact 3 Min Read

London to Paris Cycle for Prostate Cancer - Day 1

The team of brave Splunkers set out from Splunks Paddington office in London, embarking on their three-day, 375-kilometer journey to Paris, all in the name of raising awareness and funds for Prostate Cancer UK. Read all about Day 1here on Splunk Blogs.
Security 8 Min Read

The Final Shell: Introducing ShellSweepX

The Splunk Threat Research Team is excited to announce the final tool in the ShellSweep collection: ShellSweepX.
Learn 6 Min Read

The Caesar Cipher, Explained

The Caesar Cipher is among the oldest encryption techniques used to communicate securely. It’s simple to use and easy to break, as you’ll see here.
Security 12 Min Read

Previous Security Content Roundups from the Splunk Threat Research Team (STRT)

Recap: Learn about the last four quarters of security content from the Splunk Threat Research Team.
Industries 2 Min Read

Splunk SOAR Has Attained FedRAMP Moderate Authorization

Splunk SOAR has received Federal Risk and Authorization Management Program (FedRAMP) Agency Authorization at the Moderate impact level.
Learn 6 Min Read

Intrusion Detection Systems (IDS): Definition, Types, Purpose

An intrusion detection system monitors network traffic for anomalies and cyberattacks. Learn what types of IDS there are and which is right for you.