false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Platform 4 Min Read

Introducing Splunk Cloud App Export

Splunker Spencer Baker introduces Splunk Cloud App Export, a game-changer for cloud admins and app developers.
Learn 5 Min Read

ITOM vs. ITSM: IT Operations Management & IT Service Management

ITOM and ITSM both help your IT teams to better manage and deliver IT services to the business. What’s the difference? Get the full story here.
Security 4 Min Read

Staff Picks for Splunk Security Reading July 2024

Welcome to the Splunk staff picks blog, featuring a curated list of presentations, whitepapers, and customer case studies that our Splunk security experts feel are worth a read.
Learn 6 Min Read

Structured, Unstructured & Semi-Structured Data

An effective data management strategy is focused on the security, and transparency of structured, unstructured, and semi-structured data.
Learn 6 Min Read

Vulnerabilities, Threats & Risk Explained

Vulnerability, threat, risk: These terms are frequently used together, but they do explain three separate components of cybersecurity?
Tips & Tricks 4 Min Read

Convert Scheduled Dashboards to Dashboard Studio in Splunk Enterprise 9.3

Quickly and easily convert your scheduled Classic dashboards to Dashboard Studio for a superior export experience.
Security 6 Min Read

AcidPour Wiper Malware: Threat Analysis and Detections

The Splunk Threat Research Team provides an analysis of AcidPour and how to use Splunk’s out-of-the-box security content to help defend against this wiper malware.
Learn 6 Min Read

Audit Logging: A Comprehensive Guide

In this article, we’ll answer our simple question: How can you use audit logging, and what use cases do audit logs best support?
Security 3 Min Read

How Splunk SOAR is Helping Organizations Achieve a More Resilient Approach to Security

We worked with Peerspot to capture some of the ways customers have found success while using Splunk SOAR as part of their security stack.