Skip to main content
false
Leadership
6 min read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

.conf24

.conf & .conf Go
1 min read
Congratulations to all of the 2024 Splunkie Award winners announced at .conf24!
.conf & .conf Go 2 Min Read

Data Integration for Higher Education: An NJIT and Splunk Case Study

With Splunk, NJIT can combine disparate streams of event, academic and infrastructure data to bolster physical and digital security across the campus.
.conf & .conf Go 2 Min Read

Announcing the 2024 Splunk Partner Awards Winners!

Congratulations to the 2024 Splunk Partner Awards winners and our entire partner community on an outstanding year!
.conf & .conf Go 3 Min Read

Supercharge Insights with Generative AI: Splunk AI Assistant for SPL is now GA

Announced at .conf24, Splunk AI Assistant for SPL is now available globally for Splunk Cloud users.
.conf & .conf Go 3 Min Read

Cisco and Splunk Bring Full-Stack Observability to the Entire Enterprise

Splunk has teamed up with Cisco to deliver engineers and ITOps teams with an improved leading observability experience.

Learn

Latest Articles

Learn 5 Min Read

Chief Digital Officer Role: Responsibilities, Skills and Salary Expectations

In this blog post, we'll take a look at the role and responsibilities of the Chief Digital Officer.
Learn 4 Min Read

The Largest Recent Cyberattacks

Cyberattacks are always a risk, but which ones do you really need to be prepared for? Find out how the largest attacks happened this year.
Learn 6 Min Read

Multicloud Monitoring & 7 Must-Have Capabilities

Not all monitoring will cover all your workloads: multicloud monitoring has 7 core capabilitities. Without these, you're lacking the visibility you need.
Learn 5 Min Read

Real-Time Analytics: Definition, Examples & Challenges

Real time analytics is data analytics, with speed! Analytics in real time isn't for everything, but it's perfect for certain areas. Get the full & fast story here.
Learn 7 Min Read

Zero Trust & Zero Trust Network Architecture (ZTNA)

Trust no one, authenticate everyone. That's what zero trust is all about. Get the full cyber story in this in-depth article.
Learn 6 Min Read

ISACs: Information Sharing & Analysis Centers

ISACs provide a way for organizations to collaborate on threat intelligence, so they can form better cybersecurity offensive & defensive strategies.
Learn 4 Min Read

ISMS: Information Security Management Systems Explained

Learn how to establish a systematic way to manage information security. This is called the Information Security Management System (ISMS).
Learn 7 Min Read

What is Extended Detection and Response (XDR)?

XDR for cybersecurity: secure those endpoints! Get the full story on what XDR can — and cannot — do in strengthening your security posture.
Learn 4 Min Read

Maturity Models for IT & Technology

A maturity model is one way to compare your performance against an established benchmark. In our case, we’re looking at maturity models in IT and technology.