false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Splunk Life 5 Min Read

Mastering Interviews Using the STAR Technique

Learn the basics of the STAR interview technique and how to apply them with sample questions and answers.
Partners 3 Min Read

Achieving Cyber Resilience Has Never Been More Important - Here’s Why

Building a SecOps strategy to improve cyber resilience is not just a security framework for organizations – it's essential to get ahead of issues and prevent downtime from causing chaos.
Learn 8 Min Read

What’s OSINT? Open-Source Intelligence Explained

Open-source intelligence (OSINT) is the term for collecting and analyzing publicly available data to generate actionable intelligence. Get the full story on OSINT here.
Learn 5 Min Read

What Is Threat Analysis?

A threat analysis helps organizations discover what security risks they need to be protected from. Learn all about threat analysis here.
Security 3 Min Read

Comprehensive, Continuous, and Compliant: Obtain Proactive Insights with Splunk Asset and Risk Intelligence

Announcing the release of the latest addition to our security product portfolio, Splunk Asset and Risk Intelligence.
Security 3 Min Read

Fortify Digital Resilience with Splunk + Cisco Talos Incident Response

Announcing the availability of Cisco Talos Incident Response services to Splunk customers.
Observability 3 Min Read

Introducing Log Observer Connect for AppDynamics

Log Observer Connect for AppDynamics enables in-context navigation between AppDynamics and Splunk. This unified observability troubleshooting experience promises to streamline problem identification, but also aligns cross-functional teams by providing shared insights into application performance issues across tools.
Learn 7 Min Read

What Are Stored Procedures?

An important feature of SQL, stored procedures greatly improve the efficiency, security, and functionality of your database. Get the full story here.
Learn 7 Min Read

What Are Social Engineering Attacks? A Detailed Explanation

In this post, we'll explore how cybercriminals use a variety of tactics and understand how to defend against social engineering attacks.