false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Security 11 Min Read

LLM Security: Splunk & OWASP Top 10 for LLM-based Applications

Threats to LLMs are real. Let’s look at top LLM threats and show you how, with Splunk, you can better defend LLM-based applications and their users.
Security 2 Min Read

Announcing General Availability of Cisco Talos Intelligence in Splunk Attack Analyzer

We are pleased to announce the general availability of Cisco Talos threat intelligence to all Splunk Attack Analyzer customers globally.
Global Impact 3 Min Read

Impact Bytes: Sharing Their Skills and Passions for Causes in Their Communities

Splunk’s Impact Bytes series highlights customers, grantees, and employees creating positive change in our local and global communities.
Platform 2 Min Read

Unlock the Value of Cloud: Introducing Splunk Cloud Value Calculator

Splunker Deepak Belani explains how our new Splunk Cloud Value Calculator can calculate how much admin effort you can save by using Splunk Cloud Platform.
Platform 2 Min Read

What’s Next For Splunk App Developers

A sneak peak of what’s on our radar for Splunk app developers.
Observability 2 Min Read

Setting up and Understanding OpenTelemetry Collector Pipelines Through Visualization

Splunker Greg Leffler walks us through OTelBin, a free and open-source tool created by the OpenTelemetry community.
Security 6 Min Read

Embracing Observability Tools to Empower Security Incident Response

Bridge the gap between development and security with OpenTelemetry and observability tools.
Security 3 Min Read

Driving vSOC Detection with Machine Learning

In this blog, Splunker Jim Goodrich takes a deep dive into an API security use case, using machine learning to detect API anomalies, and more.
Learn 5 Min Read

Remote Code Execution (RCE) Explained in Detail

Remote code execution (RCE) attacks are a significant threat to organizations. Let's discuss more about RCE in this post.